Fig. 10
From: Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes

How a user app binds the commit-proxy. Note that a token is necessary to detect the legitimacy of a user app for the binding
From: Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes
How a user app binds the commit-proxy. Note that a token is necessary to detect the legitimacy of a user app for the binding