Client side actions validation
First Claim
1. A system comprising:
- a display;
a memory storing processor-executable process steps; and
a processor to execute the processor-executable process steps to cause the system to;
receive a first request at a server;
generate a first dataset and a second dataset at the server based on data in at least one database, wherein the second dataset is encrypted, and wherein the second dataset includes one or more items and one or more actions that may be performed on the one or more items in the second dataset;
transmit the first and second dataset to a client;
receive at the server a second request and the encrypted dataset, wherein the second request includes a request to execute an action with at least one data element in the first dataset; and
in response to receipt of the second request and encrypted dataset, decrypt the encrypted dataset to validate the second request, wherein the server determines a validity of the second request without accessing the at least one database.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system including a display; a memory storing processor-executable process steps; and a processor to execute the processor-executable process steps to cause the system to: receive a first request at a server; generate a first dataset and a second dataset at the server, wherein the second dataset is encrypted; transmit the first and second dataset to a client; receive at the server a second request and the encrypted dataset, wherein the second request includes a request to execute an action with at least one data element in the first data set; and in response to receipt of the second request and encrypted dataset, decrypt the encrypted dataset to validate the second request. Numerous other aspects are provided.
37 Citations
20 Claims
-
1. A system comprising:
-
a display; a memory storing processor-executable process steps; and a processor to execute the processor-executable process steps to cause the system to; receive a first request at a server; generate a first dataset and a second dataset at the server based on data in at least one database, wherein the second dataset is encrypted, and wherein the second dataset includes one or more items and one or more actions that may be performed on the one or more items in the second dataset; transmit the first and second dataset to a client; receive at the server a second request and the encrypted dataset, wherein the second request includes a request to execute an action with at least one data element in the first dataset; and in response to receipt of the second request and encrypted dataset, decrypt the encrypted dataset to validate the second request, wherein the server determines a validity of the second request without accessing the at least one database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method comprising:
-
receiving a first request at a server; generating a first dataset and a second dataset at the server based on data in at least one database, wherein the second dataset is encrypted, and wherein the second dataset includes one or more items and one or more actions that may be performed on the one or more items in the second dataset; transmitting the first and second dataset to a client; receiving at the server a second request and the encrypted dataset, wherein the second request includes a request to execute an action with at least one data element in the first data set; in response to receipt of the second request and the encrypted dataset, decrypting the encrypted dataset to validate the second request, wherein the server determines a validity of the second request without accessing the at least one database; and approving or declining the second request in response to decrypting the encrypted dataset. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium storing program code, the program code executable by a computer system to cause the computer system to:
-
receive a first request at a server; generate a first dataset and a second dataset at the server based on data in at least one database, wherein the second dataset is encrypted, and wherein the second dataset includes one or more items and one or more actions that may performed on the one or more items in the second dataset; transmit the first and second dataset to a client; receive at the server a second request and the encrypted dataset, wherein the second request includes a request to execute an action with at least one data element in the first data set; in response to receipt of the second request, decrypt the encrypted dataset to validate the second request, wherein the server determines a validity of the second request without accessing the at least one database; and determine if the second request is valid. - View Dependent Claims (17, 18, 19, 20)
-
Specification