Fig. 10From: Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokesHow a user app binds the commit-proxy. Note that a token is necessary to detect the legitimacy of a user app for the bindingBack to article page