Invention Grant
US08196200B1 Piggybacking malicious code blocker 有权
捎带恶意代码拦截器

Piggybacking malicious code blocker
Abstract:
A method includes determining whether a transaction request has occurred during a transaction session. Upon a determination that a transaction request has occurred, the method includes parsing critical values from the transaction request and determining whether the critical values are legitimate. If the critical values are found to be suspicious instead of legitimate, the method further includes seeking approval of the transaction request from the user of the host computer system. Upon approval of the transaction request, the transaction request is allowed. Conversely, upon denial of the transaction request, the transaction request is determined to be malicious, and protective action is taken including terminating the transaction request.
Information query
Patent Agency Ranking
0/0