System And Method For Providing Transactional Security For An End-User Device
First Claim
1. A network system comprising:
- a transaction network operative to provide a transaction with an end user;
a trusted source of a security mechanism for at least partially protecting an end-user device from malicious code operative thereon that attempts to capture confidential data presented during the transaction, the security mechanism being maintained by a party other than the end user; and
an agent for providing the security mechanism to the end-user device to protect the end-user device during the transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
A network system comprises a transaction network operative to provide a transaction with an end user; a trusted source of a security mechanism (e.g., a start/stop trigger module, an application lockout module, a network/file I/O control module, a trusted driver manager, a keystrokes generator driver, a keystrokes deletion hook, and/or a transaction network VPN manager) for at least partially protecting an end-user device from malicious code operative thereon that attempts to capture confidential data presented during the transaction, the security mechanism being maintained by a party other than the end user; and an agent for providing the security mechanism to the end-user device to protect the end-user device during the transaction.
-
Citations
42 Claims
-
1. A network system comprising:
-
a transaction network operative to provide a transaction with an end user;
a trusted source of a security mechanism for at least partially protecting an end-user device from malicious code operative thereon that attempts to capture confidential data presented during the transaction, the security mechanism being maintained by a party other than the end user; and
an agent for providing the security mechanism to the end-user device to protect the end-user device during the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method comprising:
-
requesting by an end user a secure transaction with a transaction network providing a transaction;
receiving from a trusted source a security mechanism for at least partially protecting an end-user device from malicious code operative thereon that attempts to capture confidential data presented during the transaction, the security mechanism being maintained by a party other than the end user;
activating the security mechanism;
establishing a secure connection between an end-user device and the transaction network; and
enabling the transaction. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification