Data verification via independent processors of a device

ABSTRACT

A content request communication, e.g., generated using a first processor of a device, can be transmitted to a web server. A response communication including content identifying a first value can be received from the web server. The first processor can facilitate presentation of the content on a first display of the device. A communication can be received at a second processor of the device from a remote server. The communication can include data representing a second value and can be generated at the remote server using information received from the web server. Further, the second processor can produce a secure verification output that can be presented on a separate, second display, representing at least the second value. The presentation on first display can at least partially overlap in time with the presentation on the second display.

FIELD

The present disclosure relates generally to systems and methods forfacilitating information security via verification of data, including toeach of multiple processors of a device independently receiving andprocessing a different signal to facilitate display of a presentation ata processor-controlled display, where each signal represents one or morecorresponding pieces of data.

BACKGROUND

The rise in digital advancements has been, unfortunately, accompanied bya proliferation in malware, spoofing, phishing and other cyber securitythreats. For example, link manipulation and/or website forgery can causea user to believe that a given webpage is associated with a trustedsource, while in reality, it can be hosted by another entity that isattempting to gain access to data associated with user. The webpage caninclude one or more fields that request input from a user. The fieldscan be associated with field descriptors and/or information that canfalsely identify or imply how the data is to be used. Users can then betricked into providing the other entity with access to sensitive data.Thus, techniques that facilitate determining whether presenteddescriptors and/or information are accurate can improve cyber security.

SUMMARY

In some embodiments, an electronic device is provided. The electronicdevice can include a first output component, e.g., a display configuredto output visual stimuli and a second output component, e.g., a displayconfigured to output visual stimuli. The electronic device can includeone or more first processors coupled (communicatively) to the firstoutput component and one or more second processors coupled(communicatively) to the second output component. The one or more secondprocessors can be separate from the one or more first processors. Theelectronic device can include a first computer-readable storage mediumcontaining first instructions, that, when executed by the one or morefirst processors, cause the one or more first processors to performfirst actions. The first actions can include transmitting a contentrequest communication from the electronic device to a web server andreceiving a response communication from the web server, the responsecommunication including content identifying a first value. The firstactions can also include facilitating a first presentation of thecontent at the first output component, e.g., the first display. Theelectronic device can include a second computer-readable storage mediumcontaining second instructions, that, when executed by the one or moresecond processors, cause the one or more second processors to performsecond actions. The second actions can include receiving a communicationfrom a remote server including data representing a second value. Thecommunication can include one that has been generated at the remoteserver in response to receipt of first instructions or anothercommunication from the web server. The second actions can also includegenerating a secure verification output including the second value. Thesecond actions can further include facilitating a second presentation ofthe secure verification output at the second display such that thesecond presentation of the verification output overlaps in time with thefirst presentation of the content. The second display can be separatefrom the first display.

In some embodiments, methods can be provided for using multipleprocessors on a device to generate a verification output based on webserver communications. A content request communication can betransmitted to a web server using a first processor of the device. Aresponse communication can be received from the web server. The responsecommunication can include content identifying a first value. A firstpresentation of the content on a first display of the device can befacilitated using the first processor. A communication can be receivedat a second processor of the device from a remote server, separate fromthe web server. The communication can include data representing a secondvalue. The communication can include one generated at the remote serverin response to receipt of another communication from the web server. Thesecond processor can be separate from the first processor. A secureverification output comprising the second value can be generated usingthe second processor. A second presentation can be facilitated using thesecond processor. The second presentation can include the secureverification output and can be presented at the second display such thatthe second presentation of the verification output overlaps in time withthe first presentation of the content. The second display can beseparate from the first display.

In some embodiments, an electronic device is provided that can include afirst display configured to output visual stimuli and a second displayconfigured to output visual stimuli. The electronic device can alsoinclude one or more first processors coupled to the first outputcomponent and one or more second processors coupled to the second outputcomponent and separate from the one or more first processors. Theelectronic device can also include a first computer-readable storagemedium containing first instructions, that, when executed by the one ormore first processors, cause the one or more first processors to performfirst actions. The first actions can include receiving, from a webserver, a first communication that includes transaction data andfacilitating a first presentation of the transaction information at thefirst display. The electronic device can further include a secondcomputer-readable storage medium containing second instructions, that,when executed by the one or more second processors, cause the one ormore second processors to perform second actions. The second actions caninclude receiving, from a validation server, a second communication thatincludes validation data and facilitating a second presentation at thesecond display that includes validation information that is based on thevalidation data. The validation information can be related to thetransaction information. The presentation of the transaction informationcan overlap in time with the presentation of the validation information.

The following detailed description together with the accompanyingdrawings will provide a better understanding of the nature andadvantages of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an example of an electronic device that includes multipledisplays for presenting corresponding data.

FIG. 2 illustrates an example network including a device and multipleservers that facilitate transmission to the device.

FIG. 3 is a block diagram of an example device.

FIGS. 4 and 5 are flow diagrams of example processes for presentingverification information.

DETAILED DESCRIPTION

In some embodiments, physical architecture can be configured such that afirst (e.g., primary) operating system can be executed by a firstprocessor of a device and a separate, secure operating system can beexecuted by a second processor of the device. The first processor cancontrol output of first data to a first display of the device, and thesecond processor can control output of second data to a second displayof the device. In some instances, the first display can be configuredsuch that presentations at the first display cannot be controlled,initiated and/or modified by the second processor, and/or the seconddisplay can be configured such that presentations at the second displaycannot be controlled, initiated and/or modified by the first processor.As such, in some implementations, a display, e.g., the second display,can be controlled solely by the corresponding processor, e.g., thesecond processor. The first data and the second data can pertain toand/or include same, similar, or related content.

Whether at least part of the first data matches and/or corresponds withat least part of the second data can then be used to determine whether asource (e.g., that can be hosting a webpage and/or requestinginformation) of the first data and/or second data is to be trustedand/or is authentic. In some instances, each of the first data and thesecond data can include information identifying any/all of a value(e.g., cost), a date, and/or a destination name (e.g., merchant) for apotential transaction to occur via a website. The integrity of the siteor potential transaction can then be assessed based on whether theinformation presented at the first display matches, or is otherwiseconsistent with, information presented at the second display.

The first data can include and/or have been derived based on datareceived at the device from a web server (or other first source), thesecond data can include and/or have been derived based on data receivedat the device from a verification server (or other second source).Transmissions from the first and second sources can be coordinated, inthat a communication from the web server to the verification server cantrigger a transmission from the verification server to the device. Datareceived from the verification server can be signed, and the secondprocessor can validate the signature prior to displaying the second dataor using the second data to render displayable information. In someinstances, what and/or whether data is displayed at the second displaydepends on whether the signature is validated (e.g., such that a warningindication is presented when the signature is not validated and at leastpart of the second data is presented, or used to generate presentedinformation, when the signature is validated). Further or additionalvalidation can be performed at the verification server before and/orafter the device receives the second data from the verification server.

Embodiments disclosed herein provide a variety of useful inter-devicetransaction coordination capabilities and advantages. For example, atleast some embodiments disclosed herein can promote security ofcommunications. Communications between a web server and remote servercan identify data at least partly defining a proposed action (ortransaction), such as an associated value and/or destination. A remoteserver, such as a verification server, can at least partly controlwhether the proposed action will be completed. Communications from aremote server to a user device that reflect such data can thus betrusted to reflect accurate indications as to one or more parameters ofthe proposed action. Thus, the three-way communication exchange betweena remote server (e.g., a validation server) that at least partlycontrols whether the proposed action will be completed, a web serverthat least partly defines a proposed action, and a user device thatcontrols whether to perform the proposed action can promotecommunication of accurate information to the user device.

Configuring a user device to include multiple processors (e.g., thatexecute different instances of one or more operating systems) canfurther promote device security. For example, traditionally, varioususer devices may be configured such that modified web content wasdisplayed or such that communications were transmitted to a maliciousdestination. Various implementations disclosed herein can operate toreduce or inhibit these security risks. More specifically, in someembodiments, at least a portion of the data corresponding to a proposedaction is transmitted (e.g., from multiple servers) to two separateprocessors of a device. Thus, even if one processor is compromised in amanner that alters presentations of parameters associated with aproposed action, another independent processor on the device may not besimilarly affected. Thus, respective presentations controlled by theseparate processors can be assessed to determine whether data presentedon one display of the device can be verified by, or is otherwiseconsistent with, data presented on another display of the device.Presentations on separate displays of a device (e.g., a user device) canfurther enhance this type of verification security.

As one particular illustration, a first processor at a user computerdevice can send and receive HTTP communications to facilitatepresentations of webpages (at a first primary display) at the usercomputer device. One such webpage can include data that indicates thatProduct A is being offered by Company B (that is also hosting thewebpage) for purchase for Amount X. The webpage may include a buttonthat corresponds to a request to electronically purchase Product A. Whena user clicks on the button, the user computer device may transmit anindication that the button was selected to the web server. The webserver may have been registered with a remote server that managespayment information for an account associated with the user computerdevice. The web server can then transmit transaction data thatidentifies Amount X and an account of Company B to the remote server.The remote server can generate image data that identifies Amount X andCompany B and can transmit the image data to the user computer device. Asecond processor at the user computer device can detect the image dataand cause an image identify Amount X and Company B to be presented at asecond display corresponding to a digital function row. The image can bepresented at a time during which the webpage is still displayed, so asto allow a user to determine whether the preliminary transaction data asidentified in the image corresponds to (e.g., matches) that asidentified in the webpage. In an instance where the data correspondenceis not present, a security issue may be recognized by a user, such thata user may decide not to proceed with a potential transaction.

FIG. 1 shows an example of a user device 100 that includes multipledisplays for presenting corresponding data that can be indicative of adegree of information security. In the depicted instance, user device100 is a laptop computer, but can be implemented as any device havingmultiple outputs, of which one is configured as a secure output. Userdevice 100 includes multiple displays, including a first display 105 anda second display 110.

First display 105 can be controlled (e.g., at least in part) by a firstprocessor (not shown) of user device 100. First display 105 can beconfigured (for example) to display content from one or moreapplications or programs being executed, at least in part, by the firstprocessor.

An exemplary application or program can include a web browser, such asSafari, Chrome, Firefox, or Explorer. An application can be configuredto facilitate transmission and receipt of communications (e.g., to andfrom a web server) and to present content included in or generated basedon received communications.

User device 100 can include one or more input components, such as atrackpad 115, a keyboard 120, a mouse, etc. that receive user input.Input received through one or more input components can be used, forexample, by an application or program to identify interactions withcontent presented at first display 105 and/or to determine how suchcontent is to be modified. For example, an application can use input togenerate and trigger transmission of one or more requests to a webserver.

Some communications from user device 100 can cause a web server totransmit data to a remote server (e.g., that at least partly controlswhether, when and/or how an action is to occur, such as a charge ortransfer action between accounts). The communications can include one ormore parameters that define an action, such as a destination and/orvalue of a transfer.

A different application or program (or in some implementations the sameapplication/program) on user device 100 can be configured to receive oneor more communications from the remote server. The one or morecommunications from the remote server can include the one or moreparameters and/or an indication as to whether the web server isauthentic, identified in a white-list data store, is associated withwhite-listed characteristics (e.g., location, destination location,request frequency, etc.) and/or other such indications of trust.

User device 100 can generate information to be presented based at leastin part on the communication(s) from the remote server. The informationto be presented can include the one or more parameters (which cancorrespond to one or more parameters represented at first display 105)and/or any/all of an indication as to whether the data received from theweb server and/or the web server has been authenticated, is verifiable,is of an approved format, and so on. Thus, in some instances, theinformation to be presented can include information that is tocorrespond to and/or at least partly match information presented atfirst display 105.

The other information to be presented can be displayed on second display110, such that a user can concurrently view a first presentation ofinformation on first display 105 generated based on a communication froma web server and a second presentation of information on second display110 generated based on a communication from the remote (e.g.,verification) server. The information presented on first display 105 andsecond display 110 can then be compared to determine whether itcorresponds, matches, or is otherwise consistent. Thus, a user canunderstand that a particular validation indication, e.g., associatedwith information on the second display 110 pertains to the firstpresentation of information on the first display 105.

Second display 110 can be controlled (e.g., at least in part) by asecond processor (not shown) of user device 100. Accordingly, control ofsecond display 110 can be independent of the first processor of userdevice 100, so that if the first processor (or information processed byor otherwise output therefrom) is manipulated or otherwise compromised,the presentation of information on second display 110 will remainunaffected. In some implementations, the second processor can be asecure processor. Second display 110 can be separate from first display105, e.g., located adjacent to a standard keyboard on the device. Seconddisplay 110 can include, for example, a virtual keyboard or digitalfunction row that includes a touchscreen. Second display 110 can beconfigured to, at least some of the time, present one or more inputoptions that can be selected via touch of an option. The one or moreinput options can include, for example, one or more functions (e.g., F1,F2, etc.) and/or screen input/output controls (e.g., brightness of afirst display, volume of speakers, etc.). Second display 110 can beconfigured such that presentations at the display can change in time(e.g., in response to user input detected at the second display or otherinput component and/or in response to an instruction of an applicationbeing executed at the second processor). Thus, the dynamic function rowdisplay can present context-relevant information, including informationassociated with a transaction or other such action that is in process.

User device 100 also includes a touch identification (ID) reader 125. Insome implementations, Touch ID reader 125 can be implemented as aseparate component. In other implementations, Touch ID reader 125 can beimplemented as part of second display 110, e.g., a dynamic function rowdisplay. Touch ID reader 125 can be configured to detect when a user isplacing his or her finger over the reader. For example, a sensor can beconfigured to be activated when a capacitive signal (e.g., that is abovea defined threshold) is detected (e.g., using multiple electrodes). Asanother example, a switch can be configured to detect a depression orforce. Upon detecting a user's finger, touch ID reader 125 can capturean image of the user's finger. The image can then be aligned inaccordance with one or more alignment techniques (e.g., to a standardaxis based on curvature in fingerprint lines) and compared to each ofone or more stored fingerprints of a user (or processed versionthereof). Thus, it can be estimated whether a finger corresponds to afingerprint of a particular user.

Touch ID reader 125 can act in cooperation with a processor. Forexample, a processor can perform the alignment and comparison actions.In some implementations, the processor associated with touch ID reader125 can be the processor (e.g., secure processor) that controls seconddisplay 110 and/or a secure data store (e.g., in a secure element and/orwith restricted access). In some instances, after one or more conditionsare satisfied (e.g., a processor detects validation content from theremote server and a recognized fingerprint), the processor sends aninstruction signal for transaction information (e.g., a Device AccountNumber; token specific to an account, user and/or device; credit ordebit card number; or other account identifier) to be released from thesecure data store and transmitted (e.g., to the web server or remoteserver).

While the depicted instance shows user device 100 as being a laptopcomputer, it will be appreciated that user device can include othertypes of electronic devices, such as a desktop computer, smart phone,tablet, wearable computer, set-top box, or any other such computingdevice. In some instances, a system of multiple devices (e.g., connectedto each other via a wired or wireless connection) can be used. A systemcan include (for example) at least two devices. The system can includeat least two presentation components (e.g., display, speakers or hapticcomponent) and at least two processing components. For example, each ofmultiple devices can include a display and processor. As anotherexample, a first device can include a first display, first processor,and either a second display or second processor, and a second device caninclude the other of the second display or second processor. As oneillustration, a first device can include a tablet, laptop, or desktopcomputer, and a second device can include an electronic wearable device,accessory, or smart phone.

Further, it will be appreciated that the information to be presented onsecond display 110 can instead or additionally be presented using adifferent type of output component. For example, a type of audiostimulus can identify whether web content is from a known source, and/oran audio stimulus can include spoken word that identifies one or moreparameters, e.g., a value, associated with a potential transaction. Asanother example, a haptic or force output can be presented when theremote server determines that a communication from a web server includessuspicious content or metadata, such as including a parameter, e.g., avalue, that deviates from a defined threshold or expected value, such asidentifying a destination that is outside of a country where user device100 is located.

FIG. 2 illustrates a network including a device and multiple serversthat facilitate coordinated transmission to the device. The illustratedcomponents can communicate over one or more networks. For example, twoor more components can communicate over a wired or wireless (e.g., WiFior cellular) network.

In the depicted instance, a user device 205 is in communication with aremote server 210 and a web server 215. User device 205 can collectinformation that identifies an account. For example, alphanumeric inputscan be typed and/or a camera on user device 205 can capture an imagethat identifies a number and expiration date of a payment credential,such as a credit card. User device 205 can transmit the information, ora representation thereof, to remote server 210.

Remote server 210 can then identify an identifier or token associatedwith the account. As one example, remote server 210 can generate theidentifier or token (e.g., using a cryptographic, pseudo-random or othertechnique). Remote server 210 can transmit the identifier or token andat least part of the information to a user account management system 220(e.g., a system of a bank associated with the user account). Useraccount management system 220 can then identify an account associatedwith the at least part of the information and associate the account withthe identifier or token. As another example, remote server 210 cantransmit a request for the identifier or token to user accountmanagement system 220 that includes at least part of the information.User account management system 220 can then generate the identifier ortoken (e.g., using a cryptographic, pseudo-random or other technique),store an association between the identifier or token and the useraccount, and transmit the identifier or token to remote server 210.

Remote server 210 can transmit the identifier or token for the accountto user device 205, which can store the identifier or token as secureinformation in a secure data store (e.g., secure element) of the device.In some instances, remote server 210 can encrypt the identifier or tokenprior to sending it to user device 205 and/or user device 205 can storethe identifier or token in an encrypted format.

Remote server 210 can further communicate with processing system 225,which can manage transactions associated with a web site hosted by webserver 215. Processing system 225 can send a request to remote server210 for a certificate, key (e.g., private cryptographic key) or otherdata element. Remote server 210 can generate and sign the certificate,key, or data element. The certificate or data element can uniquelyidentify processing system 225 (or associated entity) from amongst othersystems and/or entities. Remote server 210 can transmit a key and/orsigned certificate or data element to processing system 225 in one ormore communications. In some instances, generation of the signedcertificate or data element and/or transmission of the key and/or signedcertificate or data element can be conditioned, such as conditioned uponwhether an IP address is of a trusted format, whether the request isassociated with metadata of a trusted format, whether the request isassociated with an established or new account, and so on.

User device 205 can transmit a request for web content (e.g., an httprequest) to web server 215, and web server 215 can transmit web content(e.g., via transmission of an http response) to user device 205. Userdevice 205 can present the web content on a first display of user device205.

Web server 215 can detect that particular content corresponds to apotential transaction and transmit data corresponding to the potentialtransaction to remote server 210. The data can include, for example, oneor more parameters (e.g., a destination and value) associated with thepotential transaction, such as a name or identifier of an entity towhich a payment would be delivered (e.g., an identifier that isassociated with a website and/or processing system 225), an amount ofthe payment, and/or an identifier of user device 205 (e.g., an IPaddress). As one example, the data can identify a bank and account towhich a payment would be delivered if authorized and an amount of thepotential payment. Alternatively, remote server 210 can obtain datacorresponding to the potential transaction through other means, such asactively requesting the data from web server 215.

Remote server 210 can generate a secure verification output based on thedata. The secure verification output can, for example, indicate whetherthe destination matches or corresponds to any issued certificate orother data element. For example, a secure verification output can begenerated only when such a match or correspondence is identified, or thesecure verification output can be differentially generated such that oneor more aspects of the output identify whether the match orcorrespondence is identified. The secure verification output can also oralternatively identify one or more parameters (e.g., a destination,time, and/or transaction value) identified in the data received from theweb server, which can be used for verification/validation.

In some instances, remote server 210 first determines whether thedestination matches or corresponds to any issued certificate or otherdata element. If no match or correspondence is identified, a rejectioncommunication can be generated and transmitted to web server 215. If amatch or correspondence is identified, remote server 210 can generateand sign an image that includes an identification of the destination andthe value. Additionally or alternatively, remote server 210 can generateand sign data representing one or more parameters associated with thetransaction. Remote server 210 can transmit the signed image to userdevice 205. User device 205 can present the signed image (and/or othertransaction-related information) on a second display of user device 205.The concurrent presentation of the web content and signed image canenable a user to determine that the proposed transaction is associatedwith a trusted merchant and to determine whether details presented inthe web content about the proposed transaction match those representedin the signed image.

User device 205 can detect one or more inputs that authorize theproposed transaction. The detection can include, for example, detectingthat touch input received by a touch ID reader of the device matches afingerprint profile. User device 205 can then retrieve secureinformation from the secure data store and send the secure informationto web server 215 (or other server associated with the transaction). Webserver 215 can then use a key (e.g., a private key having been receivedfrom remote server 210) to decrypt the secure information. Web server215 can then transmit the decrypted secure information to processingsystem 225.

Processing system 225 can transmit the decrypted secure information toremote server 210 along with one or more transaction parameters (e.g.,identifying a destination and/or value) and a certificate and/or otherdata element that uniquely identifies processing system 225 orassociated entity. Processing system 225 can further include additionalinformation that indicates that the communication corresponds to a samesession as one for which the secure verification output was previouslygenerated. For example, the additional information can include a webpage or web site identifier or associated data (e.g., a domain name or afully qualified domain name), session identifier, and/or user IPaddress. Remote server 210 can use the additional information toretrieve one or more parameters previously received in association witha same session. Remote server 210 can determine whether the retrievedone or more parameters match those provided with the currently providedone or more transaction parameters. If the parameters do not match,remote server 210 can send a communication to processing system 225 thatrejects the transaction.

If a match is detected, remote server 210 can transmit one or morecommunications to user account management system 220. The one or morecommunications can include at least part of the decrypted secureinformation or a processed version thereof and the one or moretransaction parameters. User account management system 220 can thencommunicate with a merchant account management system to transfer thevalue identified in the one or more transaction parameters from the useraccount to an account identified as the destination (e.g., merchantaccount). User account management system 220 can transmit acommunication to remote server 210 as to whether the transfer wassuccessful, and remote server 210 can similarly provide such informationto user device 205, processing system 225 (which can then transmit theinformation to web server) and/or web server 215, such that anindication can be presented (e.g., on a first and/or second display) atuser device that indicates whether the transfer was completed.

FIG. 3 is a block diagram of an example user device 300. User device 300includes a first processor 302 and a second processor 304. Either orboth of first processor 302 and second processor 304 can be, or caninclude, one or more of: a microprocessor, a central processing unit(CPU), a general purpose processor (GPU), an application-specificintegrated circuit (ASIC), a programmable logic device (PLD), afield-programmable gate array (FPGA), a digital signal processor (DSP),a secure processor, or combinations of such devices. Either or both offirst processor 302 and second processor 304 can be or include asingle-core or multi-core microprocessor. As described herein, the term“processor” is meant to encompass a single processor or processing unit,multiple processors, multiple processing units, or other suitablyconfigured computing element or elements. In operation, each of firstprocessor 302 and second processor 304 can control the operation of partof user device 300. In various embodiments, first processor 302 and/orsecond processor 304 can execute a variety of programs in response toprogram code and can maintain multiple concurrently executing programsor processes.

First processor 302 can be separate from second processor 304, which cancorrespond to (for example) being physically separate components,physically separated within the user device, not directly connected toeach other, and/or not being functionally connected to each other suchthat an operation of one of the processors would not affect an operationof the other of the processors.

Data from a first storage subsystem 306 can be accessible to and used byfirst processor 302, and data from a second storage subsystem 308 can beaccessible to and used by second processor 304. In some instances, eachof first storage subsystem 306 and second storage subsystem 308 includesa separate (e.g., physically distinct) storage component. In someinstances, each of first storage subsystem 306 and second storagesubsystem 308 includes a different partition of a single storagecomponent. Either or both of first storage subsystem 306 and secondstorage subsystem 308 can be implemented, e.g., using magnetic storagemedia, flash memory, other semiconductor memory (e.g., DRAM, SRAM), orany other non-transitory storage medium, or a combination of media, andcan include volatile and/or non-volatile media.

Through suitable programming, first processor 302 and/or secondprocessor 304 can provide various functionality for user device 300.First processor 302 can execute a first operating system (OS) 310, e.g.,stored in first storage subsystem 306, and second processor 304 canexecute a second OS 312, e.g., stored in second storage subsystem 308.First OS 310 can be a same type or different type of OS than second OS312.

Further, first processor 302 can execute one or more applications 314,such as a browser application, app, email application, messagingapplication, and/or word processor application. At least one applicationof one or more applications 314 can be configured to (when executed) atleast partly control information presented at a first user interface(UI) 316 (e.g., a first display 318 at first UI 316). Second processor304 can further execute one or more applications, which can include avalidation app 320. Validation app 320 can be configured to at leastpartly control information presented at a second UI 321 (e.g., a seconddisplay 322 at second UI 321). For example, validation app 320 can beconfigured to receive a signed image (or other such validationinformation) from a particular source (e.g., remote server), verify thesignature and present the image at second display 322. In someinstances, at least one application that is configured for execution onone of first processor 302 and second processor 304 is not configuredfor execution on the other processor. For example, in some instances,first processor 302 may be configured to execute a browser applicationor one or more other user applications (apps) that a user can download,while second processor 304 may not be configured to execute suchapplications. Such differences may be effected due to (for example)second storage subsystem 308 lacking an initial application and/orhaving restricted or no access for allowing a user to download (orotherwise generate or store) applications to the storage subsystem.

One or more applications (e.g., app 314 and/or validation app 320) canoperate to perform part of a technique described herein. For example, abrowser application storage at first storage subsystem 306 andvalidation app 320 can be concurrently (or sequentially) operated so asto present first data with one or more transaction parameters on awebpage presented using a browser at first display 318 and to presentsecond data at second display 322. The second data can indicate whetherthe one or more transaction parameters presented on the webpage at firstdisplay 318 actually reflect those being identified to a remote serverfor a potential transaction. For example, any/all of a transactionamount, party, currency, etc. presented on the web page at first display318 can be compared with the second data presented at second display 322to determine whether there is consistency or discrepancy in the data.

User device 300 can include a security component 324 that controlsaccess to secure information 326 stored at a secure storage subsystem328. Secure storage subsystem 328 can be implemented, e.g., usingmagnetic storage media, flash memory, other semiconductor memory (e.g.,DRAM, SRAM), or any other non-transitory storage medium, or acombination of media, and can include volatile and/or non-volatilemedia.

Security component 324 can be configured to, for example, execute a datasecurity application 330 that determines whether a condition has beensatisfied and only retrieves and provides for access (e.g., viadecrypting the secure information and/or sending the information toanother component of user device 300, such as a communication subsystem332) to part or all of secure information 326 (e.g., encrypted secureinformation, which can include an account identifier) when the conditionis satisfied. For example, a condition can include having received anindication from second processor 304 that signed data has been receivedfrom a remote server and also detecting a particular type of user inputcorresponding to a request or instruction to release data. Detecting theparticular type of user input can include (for example) detecting that auser is engaging (e.g., touching or placing a finger above or near) atouch identification reader 334 (e.g., which can include a pressure,capacitive, or resistive detecting component/switch and/or imagesensor). The detection can further include determining that user inputcorresponds to a particular user (e.g., via determining that one or morefingerprint characteristics match a user profile or that a voice havingprovided a voice command has one or more voice characteristics thatmatch a user profile). Security component 324, in some instances,includes part or all of a chip and/or a secure element. In someimplementations, security component 324 can be implemented by,integrated with, or otherwise disposed in second processor 304.

User device 300 can send and receive communications via communicationsubsystem 332, which can include a transmitter, receiver and/ortransceiver. Communication subsystem 332 can include (for example) anantenna to wirelessly transmit and/or receive signals using a networksuch as a WiFi network. Communication subsystem 332 can further oralternatively be configured to support transmission and/or receipt ofcommunications over a short-range network, such as a Bluetooth,Bluetooth Low Energy or Near Field Communication network.

Communication subsystem 332 can include (for example) a radio frequency(RF) interface that can include RF transceiver components such as anantenna and supporting circuitry to enable data communication over awireless medium, e.g., using Wi-Fi (IEEE 802.11 family standards),Bluetooth® (a family of standards promulgated by Bluetooth SIG, Inc.),or other protocols for wireless data communication. In some embodiments,RF interface 408 can implement a Bluetooth LE (Low energy) proximitysensor that supports proximity detection through an estimation of signalstrength and/or other protocols for determining proximity to anotherelectronic device. The RF interface can be implemented using acombination of hardware (e.g., driver circuits, antennas,modulators/demodulators, encoders/decoders, and other analog and/ordigital signal processing circuits) and software components. Multipledifferent wireless communication protocols and associated hardware canbe incorporated into the RF interface.

Communication subsystem 332 can also or alternatively include aconnector interface that can allow user device 300 to communicate withvarious devices (e.g., a server or coordinating device) via a wiredcommunication path, e.g., using Universal Serial Bus (USB), universalasynchronous receiver/transmitter (UART), or other protocols for wireddata communication.

Each of first UI 316 and second UI 321 can monitor inputs received byuser device 300 and/or can control outputs presented by user device 300.For example, first UI 316 can include one or more input components toreceive user input, including a keyboard 336 to receive alphanumericinput selections, a microphone 338 to receive vocal or audio inputs, acamera (or image sensor) to detect visual (e.g., gesture) inputs, atouch sensor 342 to receive touch inputs (e.g., included in a track padand/or to map particular touches or touch movements to corresponding topoints or movements on first display 318) and/or click detector 344 todetect clicks (e.g., on a mouse or track pad that correspond toparticular points on first display). First UI 316 also can include othertypes of input components, such as pressure and/or motion sensors, e.g.,accelerometer and/or gyroscope. As another example, second UI 321 canalso include a touch sensor 346 and click detector 348. Second UI 321also can include other input mechanisms, including any/all of thosedisclosed with respect to first UI 316. Each of one, more or all inputcomponents can convert a detected stimulus to an electrical signal, suchas an electrical signal that corresponds to one or more letters, words,pixels, values, or instructions.

Touch sensor 342 and/or 346 can include, e.g., a resistive and/orcapacitive sensor array with the ability to localize contacts to aparticular point or region on the surface of the sensor and in someinstances, the ability to distinguish multiple simultaneous contacts. Insome embodiments, touch sensor 342 and/or 346 can be overlaid over acorresponding display 318 and/or 322 to provide a touchscreen interface,and a corresponding processor 302 and/or 304 can translate touch events(including taps and/or other gestures made with one or more contacts)into specific user inputs depending on what is currently displayed onthe display. To illustrate, one or more touch sensors can determine alocation of a touch on a display. The touch sensor can beself-capacitive in certain embodiments, mutual-capacitive in others, ora combination thereof.

Click detector 344 and/or 348 can detect a click and/or depression of abutton. For example, a click can be detected when an element underneatha button contacts an underlying device component to complete a circuitor when the depression of the button causes a switch to be activated ordeactivated. In some instances, click detector 344 and/or 348 can detecta click and/or depression for each of a plurality of buttons and canidentify which one was clicked.

Camera 340 can include, e.g., a compact digital camera that includes animage sensor such as a CMOS sensor and optical components (e.g. lenses)arranged to focus an image onto the image sensor, along with controllogic operable to use the imaging components to capture and store stilland/or video images. Images can be stored, e.g., in first storagesubsystem 306 and/or transmitted by user device 300 to other devices forstorage. Depending on implementation, the optical components can providefixed focal distance or variable focal distance; in the latter case,autofocus can be provided.

Microphone 338 can include any device that converts sound waves intoelectronic signals. In some embodiments, microphone 338 can besufficiently sensitive to provide a representation of specific wordsspoken by a user; in other embodiments, microphone 338 can be usable toprovide indications of general ambient sound levels without necessarilyproviding a high-quality electronic representation of specific sounds.

Each of first UI 316 and second UI 321 can also include one or moreoutput components, such as a display (first display 318 or seconddisplay 322), speakers (e.g., speakers 350) or a haptic output (notshown). Each of one, more or all output components can convert anelectrical stimulus to another type of stimulus, such as a visual, audioor haptic stimulus.

Each or both of first display 318 and second display 322 can beimplemented using compact display technologies, e.g., LCD (liquidcrystal display), LED (light-emitting diode), OLED (organiclight-emitting diode), or the like. In some instances, first display 318can be larger than second display 322 (e.g., in terms of area and/oralong at least one dimension). For example, a height of first display318 can be at least 2, at least 5, or at least 10 times bigger than aheight of second display. In various instances, first display 318 andsecond display 322 are on different surfaces or a same surface of userdevice 300. For example, second display 322 can be located on a firstsurface of a laptop device that can be configured to lay flat on asupport (e.g., desk, lap, table, etc.), and first display 318 can beconfigured to be located on a second surface of the laptop device thatcan be hinged to first surface and can be configured to open to aposition that is angularly separated from the first surface.

In some instances, two or more of the depicted components can beintegrated into a single component. For example, a touch screen caninclude both a display and touch sensor. In some instances, each offirst processor 302 and second processor 304 can receive inputs from atleast one same input component and can be configured to transmit outputinstructions to at least one same output component.

In some instances, execution of an app at first processor 302 can causewebpage presentations at first display 318 to change in response todetecting one or more types of inputs (e.g., one or more clickscorresponding to particular cursor positions, voice commands, or keyentries). Such presentation changes can be a result of generating andtransmitting webpage requests and receiving webpage data throughcommunication subsystem 332. Communications associated with variousmetadata aspects (e.g., identifying a source, processor characteristicor instruction type) can be selectively routed by communicationsubsystem 332 to one of first processor 302 and second processor 304, orexecution of particular apps or operating systems on one or both offirst processor 302 and second processor 304 can cause the processor toselectively request or use communications associated with particularmetadata aspects. For example, execution of validation app 320 at secondprocessor 304 can cause second processor 304 to monitor forcommunications from a particular system or server and/or with metadataindicating that the communication corresponds to a validation technique.Upon detecting such a communication, the app execution can result in asignature in the communication to be verified and an image from thecommunication to be presented at second display.

Execution of data security app 330 at security component 324 can thenmonitor to determine whether touch identification reader 334 receives aninput from a particular user corresponding to an instruction to transmitsecure information to a source associated with the webpage. Upondetecting such input, security component 324 can retrieve part or all ofsecure information 326 and facilitate transmission of the part or all ofthe information. In some instances, secure information includesinformation corresponding to each of multiple accounts, and securitycomponent 324 selectively retrieves information for a single account.The single account can correspond to a default account or one identified(for example) based on user input detected by an input component atfirst UI 316 or second UI 321.

User device 300 can include a power subsystem 352, which can providepower and power management capabilities for user device 300. Forexample, power subsystem 352 can include a battery (e.g., a rechargeablebattery) and associated circuitry to distribute power from the batteryto other components of user device 300 that require electrical power. Insome embodiments, power subsystem 352 can also include circuitryoperable to charge the battery, e.g., when power or charging cord isconnected to a power source. In some embodiments, power subsystem 352can include a “wireless” charger, such as an inductive charger, tocharge the battery without relying on a power or charging cord. In someembodiments, power subsystem 352 can also include other power sources,such as a solar cell, in addition to or instead of a battery.

In some embodiments, control functions of power subsystem 352 can beimplemented using programmable or controllable circuits operating inresponse to control signals generated by first processor 302 and/orsecond processor 304 in response to program code executing thereon, oras a separate microprocessor or microcontroller. In some embodiments,control functions of power subsystem 352 can be based on userinteraction with the device (e.g., to power down components if a devicehas not been interacted with in a particular manner, such as via atouch, button press or network activity, for a defined period of time).

It will be appreciated that user device 300 is illustrative and thatvariations and modifications are possible. For example, one or both offirst UI 316 and second UI 321 can include fewer, different oradditional input or output components, such as a haptic output.

Further, while user device 300 is described with reference to particularblocks, it is to be understood that these blocks are defined forconvenience of description and are not intended to imply a particularphysical arrangement of component parts. Further, the blocks need not(but can) correspond to physically distinct components. Blocks can beconfigured to perform various operations, e.g., by programming aprocessor or providing appropriate control circuitry, and various blocksmight or might not be reconfigurable depending on how the initialconfiguration is obtained. Embodiments of the present invention can berealized in a variety of apparatus including electronic devicesimplemented using any combination of circuitry and software. It is alsonot required that every block in FIG. 3 be implemented in a givenembodiment of a user device.

FIG. 4 is a flow diagram of an example process 400 for facilitatingassessments of data integrity. Part or all of process 400 can beperformed by a user device, such as user device 100, 205 or 300.

In process 400, a content request communication can be transmitted (405)from a device to a web server using a first processor of the device. Forexample, the first processor can generate the content requestcommunication (e.g., via execution of a browser application) and providethe communication to a communication subsystem of the device fortransmission. The content request communication can include anidentifier of (for example) a web page, domain name, link, app, fullyqualified domain name, etc. The content request communication caninclude an http request. The web server can include a server hosting aweb page that corresponds to an identifier of a web page, domain name,link, fully qualified domain name included in the request.

A response communication can be received (410) at the device from theweb server. The response communication can include content thatcorresponds to an identified web page, domain name, link, fullyqualified domain name, app, etc. The content can correspond to and/or atleast partly define a potential transaction. For example, the contentcan identify (e.g., by name, identifying alphanumeric code, picture,video, description, or other data elements) a product or service that isavailable, a destination name or identifier (e.g., name or identifier ofan entity from which it is available), and/or a first value (e.g.,price). In some instances, the content can include one or more fields toaccept user input that can correspond to an instruction to initiateand/or continue the transaction, including payment and/or paymentauthorization data, shipping information, etc.

A first presentation (415) of the content on a first display of thedevice can be facilitated using the first processor. For example, usingan application being executed by first processor, the content can bepresented in a browser window, app, or other such interface. In someinstances, the first presentation (415) can include opening a new windowand presenting the content in the new window. The first display caninclude a primary integrated display of the device. For example, adevice can include two hinged surfaces, where a bottom surface can beconfigured to rest on a support (e.g., table, lap, etc.) and includes akeyboard and another surface can be configured to open from the bottomsurface and to be non-parallel from the support while the device is inuse. The first display can include one integrated into the othersurface, e.g., on an interior surface. In some instances, the firstdisplay extends across at least 50, at least 75, or at least 90 percentof a face on the surface.

A communication can be received (420) at the second processor from aremote server. For example, a communication component can receive thecommunication and detect that the communication includes data ormetadata that corresponds to or is otherwise intended for or associatedwith the second processor, or an application associated with the secondprocessor, and can then route the communication to the second processor.

The communication can include information corresponding to or otherwiseassociated with information included in the first presentation. Forexample, the communication can include a second value that correspondsto the first value, and (in some instances) can include additionalinformation (e.g., a destination name) that corresponds to dataidentified in the first presentation. The correspondence need notindicate that the values (or other data) match. For example, whether thefirst and second values match can indicate whether the content receivedfrom the web server, as reflected in the first presentation, is trustedand/or accurate. Alternatively or additionally, a discrepancy betweenthe first and second values, or any other transaction-relatedinformation, can indicate a lack of data integrity or a potentialsecurity threat. The communication received at the second processor canhave been generated at the remote server in response to receipt ofanother communication from the web server.

For example, the web server or associated system can have transmittedthe other communication to the remote server, e.g., in response toreceiving the content request from the device. The other communicationcan have included the second value and/or additional information that atleast partly define a potential transaction. The remote server can storethis data in association with identifying information, such as anidentifier of a session, of the device, of the web server, of a webpage,and/or of a date and time to use for a later data comparison should theremote server receive a subsequent request from the web server orassociated system to proceed with the transaction. If differences in thedata are detected, the remote server can then reject the request. Thus,it can be advantageous for the web server to provide accurate data inthe communication.

The second processor can be configured to operate independently from thefirst processor, such that an action performed by one of the first andsecond processors does not influence operation of the other of the firstand second processors. The first and second processors can executedifferent operating systems and/or different iterations of an operatingsystem. This independence can inhibit or prevent one of the processorsfrom being affected by a security threat (e.g., virus) as a result ofthe other processor being affected by the security threat. For example,the first processor can be a general purpose processor executing anunsecure OS, while the second processor can be a secure processorexecuting a secure OS. As discussed below, in the event a transactiondetail in the information presented on a display controlled by the firstprocessor is manipulated, e.g., to reflect a lower price, thecorresponding information presented on a separate display controlled bythe secure processor can show a different value (e.g., the actual value)for the transaction detail—thereby indicating a potential risk throughthe discrepancy.

A secure verification output that includes a representation of thesecond value can be generated (425) (e.g., using the second processor).Generating the secure verification output can include extracting datafrom the communication received from the remote server and/or generatinga new data object (e.g., image, audio stimulus and/or text presentation)based on the data in the communication received from the remote server.For example, the communication can include a signed image object, andgenerating the secure verification output (425) can include identifyingthe part of the communication corresponding to the image object. Asanother example, the communication can identify the second value (e.g.,a second destination name), and the second processor can generate asigned image, audio signal and/or visual presentation (e.g., includingtext) that includes the second value (e.g., and second destinationname).

In some instances, the second processor can be involved in validating asignature included in the communication from the remote server. In someinstances, performance of generating the secure verification output(425) can be conditioned upon whether the signature is validated.

Validating the signature can include, for example, determining whetherthe signature is consistent with a stored key or algorithm, determiningwhether a format of the signature matches or corresponds with a storeddefined type of format, and/or determining whether part or all of thesignature matches or accords with a defined or stored format or value.

A second presentation (430) of the verification output at the device canbe facilitated using the second processor. The second presentation caninclude one to be concurrently, at least for a period of time, presentedwith the first presentation of the content. For example, at least someof the second presentation can coincide with (or overlap) at least someof the first presentation. The second presentation can be presented on asecond display separate from the first display. In some implementations,the second display can be implemented as, for example, a dynamicfunction row of the device or other such secondary display. In someimplementations, the second display can be positioned, for example,near, adjacent to, or on a same surface as a keyboard. Further, in someimplementations, the second display can be controlled independently ofthe first display. In some instances, the second display includes adisplay that is only controlled by instructions from the secondprocessor, such as a secure processor.

Thus, process 400 can facilitate presentation of transaction-relatedinformation on multiple displays, each of which can include at least avalue and/or other transaction-related information. The coincidentpresentation on separate displays can enable a user to compare valuesand/or other information between the presentations. Matching valuesand/or matching other information can indicate that content associatedwith the transaction, e.g., from the web server, is trustworthy and/orthat a proposed transaction is secure. In some embodiments, a device caninclude multiple components (e.g., processors, operating systems and/ordisplays) that are actually, effectively and/or functionally isolated,such that individual security threats affecting part of the device areunlikely to, or cannot, compromise another aspect of the device. Forexample, manipulation of a processor or other aspect of a device toresult in the presentation of one or more items of incorrect transactioninformation (e.g., a price) on one display may not be able to similarlyimpact an independent secure processor that controls the presentation ofcorresponding transaction-related information on a separate seconddisplay, thereby allowing a discrepancy in at least onetransaction-related parameter to be identified before a transaction isconfirmed or otherwise completed.

The device can be configured to receive an input subsequent to at leastpart of the coincident presentations that indicates that a transactionis authorized and requests that secure information be transmitted to adestination. For example, the input can include a touch on a touch IDreader from a user with one or more fingerprint characteristics thatmatch a profile. Secure information (e.g., that includes an identifierof an account) can then be retrieved from a secure data store (e.g.,from a secure element), optionally decrypted, and transmitted to theremote server and/or web server. In some instances, other information,such as the first value can also be transmitted to the remote serverand/or web server.

FIG. 5 is a flow diagram of an example process 500 for facilitating anassessment of data integrity. Process 500 includes communicationexchanges between various devices and device components. A user devicecan include, among other elements, each of the first processor, firstdisplay, second processor, second display and secure data store. In someimplementations, the second processor can be a secure processorincorporating or otherwise associated with a secure element and thesecure data store. Further, in some implementations, the secondprocessor can control the second display, at least during certainperiods, such that content can be securely rendered to the seconddisplay independently of the first processor.

A first action can include sending a content request from a user device,using a first processor, to a web server or other such device. In someimplementations, the content request can include an http content requestand/or a request for web data. A second action can include transmitting,e.g., from the web server to the user device, a response that includesthe requested content (to be handled by the first processor). Thecontent can include one or more parameters associated with a potentialtransaction, such as a value and/or a destination.

A third action can include the first processor sending the content to afirst display (e.g., an integrated first display) for presentation. Forexample, the first processor and/or one or more associated componentscan format the content for output to a display. A fourth action caninclude the first display displaying the content. For example, thecontent can be presented as a web page, pop-up window, payment sheet,etc. in a browser or in another such window or application. The contentcan be displayed for a period of time. The period of time can includeone defined by an end time corresponding to, for example, a time atwhich a navigation input is received, e.g., at an interface of thedevice (e.g., corresponding to a new content request), a time at whichnew content (e.g., of a particular type, such as content correspondingto a new webpage, is received from the web server or another device)and/or a time at which user input corresponds to a request to exit fromor close an application.

A fifth action can include the first processor detecting an input thatcorresponds to a request to initiate a transaction process. The inputcan include, for example, a click, tap, touch, or other suchinput/gesture/command (e.g., on a mouse, track pad or touchscreen)corresponding to an option in the displayed content that signals intentto initiate a transaction. For example, the input can include clicking,touching, or tapping on a part of the displayed content that correspondsto a link identified as one that initiates the transaction process(e.g., a “buy” button). The input also can include entry of one or morekeystrokes identifying the request or a vocal command received at amicrophone. In some instances, the request input may cause the contentthat was displayed at the fourth action to be changed or updated. Forexample, the content may be updated to identify fields for acceptingtransaction information, to identify transaction information, or toidentify an option to confirm completion of a transaction.

A sixth action can include the first processor facilitating sending atransaction instruction to the web server. The instruction can include,for example, information corresponding to the input (e.g., which linkwas selected), information corresponding to a user device (e.g., deviceidentifier and/or IP address), and/or information corresponding to acommunication exchange (e.g., session identifier).

A seventh action includes the web server sending a communication thatincludes a transaction indication to a remote server, such as a remoteserver that controls release of user account information or processingof a payment transaction. The indication can include at least one of theone or more parameters included in the content and/or defining apotential transaction associated with the content. For example, theindication can include a value (e.g., price) and destination (e.g.,merchant name or identifier) of an item presented as being for sale inthe content. The indication can also include information about the userdevice (e.g., unique device identifier, IP address, operating system,and/or browser being used) and/or present communication exchange (e.g.,webpage, domain name, or other identifier of the content being displayedand/or a session identifier).

An eighth action can include the remote server generating signed databased on the communication from the web server. In some instances, thesigned data represents each of one, multiple, or all parametersidentified in the communication. For example, the signed data caninclude one or more numbers identifying the value associated with atransaction and/or the name of a destination. In some implementations,the signed data can be generated as an image object that can be renderedto a display. In some other implementations, the signed data can includean audio file that represents the value and/or destination name in amanner that can be output as an audio signal, such as through one ormore speakers. The signed data also can be represented in text or anyother data format or formats that can be interpreted by the user device.

The generation can include generating a signature based on an object(e.g., image object) and one or more keys. For example, the signaturecan include a hash value generated based on the object and a hashingalgorithm that is encrypted using a private key. The encryption can beperformed such that a receiving device can use a public key (e.g.,provided in a certificate issued to the receiving device) to decrypt thehash value. The receiving device can use the hash value to ensure thatthe accompanying object has not been compromised. The signed data canfurther identify (for example) a hashing algorithm.

At a ninth action, the remote server sends the signed data to a secondprocessor at the user device. The second processor can control (e.g.,detecting inputs and identifying outputs) a second display of the userdevice. The second display can be implemented as or otherwise include,for example, a virtual keyboard or digital function row. Further, thesecond display can include a touchscreen. The second display can beconfigured to, at least some of the time, present one or more inputoptions that can be selected, e.g., via touch of an associated area. Theone or more input options can include, for example, one or morefunctions (e.g., F1, F2, etc.) and/or screen input/output controls(e.g., brightness of a first display, volume of speakers, etc.). Thesecond display can be configured such that presentations at the displaycan change in time (e.g., in response to user input detected at thesecond display or other input component and/or in response to aninstruction of an application being executed at the second processor).

The second processor can be independent of, physically distinct from,and/or not connected (e.g., via electronic circuitry) to the firstprocessor. In some instances, one or more rules indicate which types ofcommunications are to be routed to which of the first and secondprocessors, and/or which types of communications and/or functions eachof the first and second processors are to process respectively.

At a tenth action, the second processor validates a signature associatedwith the signed data. The validation can include, for example,decrypting the signature using a stored public key (e.g., previouslyreceived from the remote server) and/or determining whether thesignature and/or decrypted signature corresponds with particular data.In some instances, the determination includes determining whether a hashvalue identified in the decrypted signature matches a hash value thatthe second processor generates using, e.g., the received image, and ahashing algorithm (e.g., which can be predefined or identified in thedecrypted signature).

At an eleventh action, the second processor sends the validation contentreceived from the remote server, such as the image, or other renderablecontent, to the second display (e.g., an integrated second display ofthe device), and a twelfth action can include the second displaypresenting the content. For example, the content can be presented acrossall or part of a dynamic function row, virtual keyboard, or other suchintegrated display. The image can be presented for a period of time(e.g., a predefined period of time or until an event occurs). Thedisplay (e.g., of the image) on the second display can at leastpartially overlap in time with the display of the content on the firstdisplay.

The period of time for which the image is displayed can include onedefined by an end time corresponding to, for example, a predefined timeperiod, a time at which an input of one or more defined types isreceived, or a combination thereof (e.g., an earlier of the two). Theinput can include one received at a user interface controlled by and/oraccessible to the first processor, a user interface controlled by and/oraccessible to the second processor, or another user interface. The inputcan include one that corresponds to an authorization, or a rejection, ofa transaction. For example, the input can include touching one ofmultiple defined portions of a dynamic function row, virtual keyboard,or other such integrated display at which an actionable control isdisplayed.

A thirteenth action can include the second processor detecting an inputthat corresponds to an authorization to conduct a transactioncorresponding to the content and/or image, e.g., presented on the seconddisplay. In some instances, the input includes a biometricauthentication, such as a touch at a touch ID reader with one or morefingerprint characteristics matching that of a profile. In some otherinstances, the input can include, for example, a click, tap, touch, orother such input on the second display or an input/output componentcommunicatively coupled with either or both of the first processorand/or the second processor. In some other instances, detecting anauthorization input includes detecting that each of multiple types ofinputs (e.g., received at one or more user interfaces) was receivedwithin a defined period of time. Whether a user input component (e.g.,touch ID reader) is powered on or configured to accept inputs and/orwhether an input is recognized as an authorization input can depend on acontext. For example, in some implementations, the second processor canonly recognize a biometric authentication (or other suchauthentication), e.g., a touch ID, as a transaction authorization if thebiometric authentication is detected while the transaction relatedinformation is presented on the second display, within a predeterminedperiod of time of presenting the transaction related information on thesecond display, or other such qualifying event.

At a fourteenth action, in response to detecting the authorizationinput, secure information (e.g., including an account identifier) can beretrieved from a secure data store. In some instances, a secure elementhosts the secure data store and can control data access. The secureinformation can also be locally processed to, e.g., decrypt theinformation, encrypt the information, and/or transform the informationto include more, less or different information. A fifteenth actionincludes sending the secure information (or processed version thereof)to the remote server or other server, e.g., to continue processing thetransaction.

Embodiments, e.g., in methods, apparatus, computer-readable media andthe like, can be realized using any combination of dedicated componentsand/or programmable processors and/or other programmable devices. Thevarious processes described herein can be implemented on the sameprocessor or different processors in any combination. Where componentsare described as being configured to perform certain operations, suchconfiguration can be accomplished, e.g., by designing electroniccircuits to perform the operation, by programming programmableelectronic circuits (such as microprocessors) to perform the operation,or any combination thereof. Further, while the embodiments describedabove can make reference to specific hardware and software components,those skilled in the art will appreciate that different combinations ofhardware and/or software components can also be used and that particularoperations described as being implemented in hardware might also beimplemented in software or vice versa.

Computer programs incorporating various disclosed features can beencoded and stored on various computer readable storage media; suitablemedia include magnetic disk or tape, optical storage media such ascompact disk (CD) or DVD (digital versatile disk), flash memory, andother non-transitory media. Computer readable media encoded with theprogram code can be packaged with a compatible electronic device, or theprogram code can be provided separately from electronic devices (e.g.,via Internet download or as a separately packaged computer-readablestorage medium).

Thus, although the invention has been described with respect to specificembodiments, it will be appreciated that the invention is intended tocover all modifications and equivalents within the scope of thefollowing claims.

1. An electronic device comprising: a first display configured to outputvisual stimuli; a second display configured to output visual stimuli;one or more first processors coupled to the first display; one or moresecond processors coupled to the second display and separate from theone or more first processors; and a first computer-readable storagemedium containing first instructions, that, when executed by the one ormore first processors, cause the one or more first processors to performfirst actions including: transmitting a content request communicationfrom the electronic device to a web server; receiving a responsecommunication from the web server, the response communication comprisingcontent identifying a first value; and facilitating a first presentationof the content at the first display; and a second computer-readablestorage medium containing second instructions, that, when executed bythe one or more second processors, cause the one or more secondprocessors to perform second actions including: receiving acommunication from a remote server comprising data representing a secondvalue, the communication having been generated at the remote server inresponse to receipt of another communication from the web server;generating a secure verification output representative of the secondvalue; and facilitating a second presentation of the secure verificationoutput at the second display such that the second presentation of thesecure verification output is concurrent with the first presentation ofthe content, wherein the second display separate from the first display.2. The electronic device of claim 1, the one or more second processorscomprise a secure processor configured to control the second displayindependently of any of the one or more first processors.
 3. Theelectronic device of claim 1, wherein: the content further identifies afirst destination name; the data further represents a second destinationname; and the secure verification output further identifies the seconddestination name.
 4. The electronic device of claim 1, furthercomprising: a secure data store that stores secure information; whereinthe second actions further include: retrieving the secure informationfrom the secure data store; and transmitting a secure communication tothe remote server, the secure communication including the secureinformation.
 5. The electronic device of claim 4, further comprising: asecure element that hosts the secure data store.
 6. The electronicdevice of claim 1, wherein the communication further includes asignature of the data, and wherein the second actions further include:determining, based on the signature, that the data is valid; wherein thesecure verification output is selectively presented when the data isvalid.
 7. The electronic device of claim 1, further comprising: a securedata store that stores secure information; wherein the second actionsfurther include: detecting, during the concurrent first presentation andsecond presentation, an input corresponding to a request to transmitsecure information; and in response to detecting the input: retrievingthe secure information from the secure data store; and transmitting asecure communication to the remote server, the secure communicationincluding the secure information and the first value.
 8. The electronicdevice of claim 1, wherein: facilitating the first presentation of thecontent at the electronic device includes facilitating the firstpresentation of the content on a primary integrated display of theelectronic device; and facilitating the second presentation of thesecure verification output at the electronic device includesfacilitating the second presentation of the secure verification outputon a dynamic function row of the electronic device.
 9. The electronicdevice of claim 1, wherein: the electronic device includes: first codecorresponding to a first operating system; and second code correspondingto a second operating system comprising a secure operating system; theone or more first processor are s configured to execute the first codecorresponding to the first operating system; and the one or more secondprocessors are configured to execute the second code corresponding tothe second operating system, but not to execute the first codecorresponding to the first operating system.
 10. The electronic deviceof claim 1, wherein the electronic device includes a laptop computerthat includes: a display panel that includes the first display; and abase assembly that includes the one or more first processors, the one ormore second processors, and the second display; wherein the displaypanel is connected to the base assembly via one or more hinges.
 11. Amethod for using multiple processors on a device to generateverification outputs based on web server communications, the methodcomprising: transmitting, using a first processor of the device, acontent request communication to a web server; receiving a responsecommunication from the web server, the response communication comprisingcontent identifying a first value; facilitating, using the firstprocessor, a first presentation of the content on a first display of thedevice; receiving, at a second processor of the device separate from thefirst processor, a communication from a remote server comprising datarepresenting a second value, the communication having been generated atthe remote server in response to receipt of another communication fromthe web server; generating, using the second processor, a secureverification output, the secure verification output being representativeof the second value; and facilitating, using the second processor, asecond presentation of the secure verification output at the deviceconcurrently with the first presentation of the content, wherein thesecond presentation is presented on a second display separate from thefirst display.
 12. The method for using multiple processors to generateverification outputs based on web server communications of claim 11,wherein: the second processor comprises a secure processor configured tocontrol the second display independently of the first processor.
 13. Themethod for using multiple processors to generate verification outputsbased on web server communications of claim 11, wherein: the contentfurther identifies a first destination name; the data further representsa second destination name; and the secure verification output furtheridentifies the second destination name.
 14. The method for usingmultiple processors to generate verification outputs based on web servercommunications of claim 11, further comprising: retrieving, using thesecond processor, secure information from a secure data store at thedevice; and transmitting a secure communication to the remote server,the secure communication including the secure information.
 15. Themethod for using multiple processors to generate verification outputsbased on web server communications of claim 14, further comprising: asecure element that hosts the secure data store.
 16. The method forusing multiple processors to generate verification outputs based on webserver communications of claim 11, wherein the communication furtherincludes a signature of the data, and wherein the method furtherincludes: determining, based on the signature, that the data is valid;wherein the secure verification output is selectively presented when thedata is valid.
 17. The method for using multiple processors to generateverification outputs based on web server communications of claim 11,further comprising: detecting, during the concurrent first presentationand second presentation, an input corresponding to a request to transmitsecure information; and in response to detecting the input: retrievingsecure information from a secure data store at the device; andtransmitting a secure communication to the remote server, the securecommunication including the secure information and the first value. 18.The method for using multiple processors to generate verificationoutputs based on web server communications of claim 11, wherein:facilitating the first presentation of the content at the deviceincludes facilitating the first presentation of the content on a primaryintegrated display of the device; and facilitating the secondpresentation of the verification output at the device includesfacilitating the second presentation of the verification output on adynamic function row of the device.
 19. The method for using multipleprocessors to generate verification outputs based on web servercommunications of claim 11, wherein: the device includes: first codecorresponding to a first operating system; and second code correspondingto a second operating system comprising a secure operating system; thefirst processor is configured to execute the first code corresponding tothe first operating system; and the second processor is configured toexecute the second code corresponding to the second operating system,but not to execute the first code corresponding to the first operatingsystem.
 20. The method for using multiple processors to generateverification outputs based on web server communications of claim 11,wherein the device includes a laptop computer that includes: a displaypanel that includes the first display; and a base assembly that includesthe first processor, the second processor, and the second display;wherein the display panel is connected to the base assembly via one ormore hinges.