METHODS AND SYSTEMS FOR PREVENTING INFORMATION THEFT
First Claim
Patent Images
1. A method of preventing information theft, comprising:
- receiving a request to establish a connection to a secure destination;
determining a validity of the secure destination; and
preventing the connection to the secure destination when the secure destination is determined invalid,wherein determining the validity of the secure destination comprises authenticating security credentials of the secure destination.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention assist in preventing information theft by automatically blocking a user from interacting with an invalid or insecure site on a network, such as a suspect SSL site the Internet. In particular, information theft may be prevented by determining the validity of a secure destination. Instead of providing a warning, the user is automatically blocked from establishing a connection to that site, or blocks any rendering of the broken site. The user may then realize that they have navigated to an unsecured location and should reconsider their action.
72 Citations
20 Claims
-
1. A method of preventing information theft, comprising:
-
receiving a request to establish a connection to a secure destination; determining a validity of the secure destination; and preventing the connection to the secure destination when the secure destination is determined invalid, wherein determining the validity of the secure destination comprises authenticating security credentials of the secure destination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of preventing phishing of personal information, comprising:
-
receiving a request to establish a connection to a secure socket layer (SSL) website; determining a validity of the SSL website; preventing the connection to the SSL website when the SSL website is determined invalid, wherein determining the validity of the SSL website comprises authenticating a certificate of the SSL website. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for preventing information theft, comprising:
-
an input for receiving a request to establish a connection to a secure destination; a processor configured to determine a validity of the secure destination and prevent the connection to the secure destination when the secure destination is determined invalid, wherein determining the validity of the secure destination comprises authenticating security credentials of the secure destination.
-
Specification