Method, system and computer program product for security in a global computer network transaction
First Claim
Patent Images
1. A method performed by a first information handling system (“
- IHS”
), the method comprising;
from the first IHS to a second IHS, in response to a request for initiating an online transaction, downloading a program for detecting malicious code on the second IHS.
7 Assignments
0 Petitions
Accused Products
Abstract
From a first information handling system (“IHS”) to a second IHS, in response to a request for initiating an online transaction, a program is downloaded for detecting malicious code on the second IHS.
295 Citations
78 Claims
-
1. A method performed by a first information handling system (“
- IHS”
), the method comprising;
from the first IHS to a second IHS, in response to a request for initiating an online transaction, downloading a program for detecting malicious code on the second IHS. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
- IHS”
-
27. A first information handling system (“
- IHS”
), comprising;
a computer system for;
from the first IHS to a second IHS, in response to a request for initiating an online transaction, downloading a program for detecting malicious code on the second IHS. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
- IHS”
-
53. A computer program product, comprising:
-
a first computer program processable by a first information handling system (“
IHS”
) for causing the first IHS to;
from the first IHS to a second IHS, in response to a request for initiating an online transaction, download a second computer program for detecting malicious code on the second IHS; and
apparatus from which the first computer program is accessible by the first IHS. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78)
-
Specification