PROTECTION AGAINST IMPERSONATION ATTACKS
First Claim
Patent Images
1. A computing method, comprising:
- running on a user computer a first operating environment for performing general-purpose operations and a second operating environment, which is configured expressly for interacting with a server in a protected communication session and is isolated from the first operating environment;
detecting by a program running in the second operating environment an attempt to imitate the protected communication session made by an illegitimate communication session that interacts with the first operating environment; and
automatically inhibiting the detected attempt.
3 Assignments
0 Petitions
Accused Products
Abstract
A computing method includes running on a user computer a first operating environment for performing general-purpose operations and a second operating environment, which is configured expressly for interacting with a server in a protected communication session and is isolated from the first operating environment. A program running in the second operating environment detects an attempt to imitate the protected communication session made by an illegitimate communication session that interacts with the first operating environment. The detected attempt is inhibited automatically.
-
Citations
33 Claims
-
1. A computing method, comprising:
-
running on a user computer a first operating environment for performing general-purpose operations and a second operating environment, which is configured expressly for interacting with a server in a protected communication session and is isolated from the first operating environment; detecting by a program running in the second operating environment an attempt to imitate the protected communication session made by an illegitimate communication session that interacts with the first operating environment; and automatically inhibiting the detected attempt. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A user computer, comprising:
-
an interface, which is operative to communicate with a server over a communication network; and a processor, which is coupled to run a first operating environment, which is configured to perform general-purpose operations, and a second operating environment, which is configured expressly for interacting with the server in a protected communication session and is isolated from the first operating environment, wherein the second operating environment is further configured to detect an attempt to imitate the protected communication session made by an illegitimate communication session that interacts with the first operating environment, and to automatically inhibit the detected attempt. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A computer software product for use in a user computer, the product comprising a computer-readable medium, in which program instructions are stored, which instructions, when executed by the user computer, cause the user computer to communicate with a server over a communication network, to run a first operating environment for performing general-purpose operations, to run a second operating environment, which is configured expressly for interacting with the server in a communication session and is isolated from the first operating environment, to detect by a program running in the second operating environment an attempt to imitate the protected communication session made by an illegitimate communication session that interacts with the first operating environment, and to automatically inhibit the detected attempt.
Specification