METHOD, COMPUTER SOFTWARE, AND SYSTEM FOR PROVIDING END TO END SECURITY PROTECTION OF AN ONLINE TRANSACTION
4 Assignments
0 Petitions
Accused Products
Abstract
A method for implementing an online transaction security product includes downloading an online transaction security product program from a web site to an information handling system. The security product program includes an anti-malicious code program configured to detect malicious code on the information handling system. Lastly, the security product program is executed, wherein the anti-malicious code program of the security product program operates to detect malicious code on the information handling system.
64 Citations
76 Claims
-
1-56. -56. (canceled)
-
57. A computer-readable medium storing program instructions executable on a computing device to:
-
at the point of entry into or during a transaction over a wide-area network, detect whether malicious code is executing on the computing device; upon malicious code being detected, determining whether or not to continue the transaction. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65, 66)
-
-
67. A computer-readable medium storing program instructions executable on a computing device involved in an online transaction to:
-
at the point of entry into or during the online transaction, determine whether malicious code is running on the computing device; and upon determining that malicious code is running on the computing device, terminate the online transaction. - View Dependent Claims (68, 69, 70)
-
-
71. A computer-readable medium storing program instructions executable on a computing device involved in an online transaction to:
-
at the point of entry into or during the online transaction, determine whether malicious code is running on the computing device; and upon determining that malicious code is running on the computing device, suspend the online transaction until the malicious code is disabled. - View Dependent Claims (72, 73, 74, 75, 76)
-
Specification