METHOD FOR RENDERING PASSWORD THEFT INEFFECTIVE
First Claim
Patent Images
1. A method for rendering a login theft ineffective comprising the steps of:
- a. detecting a submission of a first login request from the user'"'"'s client to a Web site;
b. redirecting said first login request to the traffic processor for copying at least one of the user supplied login fields;
c. forwarding said first login request from said traffic processor to said site;
d. requesting replacements of at least one of said user supplied login fields from said site; and
e. replacing said at least one of user supplied login fields with at least one new corresponding login field(s) in said site.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for rendering a login theft ineffective includes detecting a submission of a first login request from the user'"'"'s client to a Web site; redirecting the first login request to the traffic processor for copying at least one of the user supplied login fields; forwarding the first login request from the traffic processor to the site; requesting replacements of at least one of the user supplied login fields from the site; and replacing the at least one of user supplied login fields with at least one new corresponding login field(s) in the site.
-
Citations
10 Claims
-
1. A method for rendering a login theft ineffective comprising the steps of:
-
a. detecting a submission of a first login request from the user'"'"'s client to a Web site; b. redirecting said first login request to the traffic processor for copying at least one of the user supplied login fields; c. forwarding said first login request from said traffic processor to said site; d. requesting replacements of at least one of said user supplied login fields from said site; and e. replacing said at least one of user supplied login fields with at least one new corresponding login field(s) in said site. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for rendering a login theft ineffective comprising the steps of:
-
a. detecting a submission of a first login request from a client to a Server; b. redirecting said first login request to the traffic processor for copying at least one of the user supplied login fields; c. forwarding said first login request from said traffic processor to said Server; d. requesting replacements of at least one of said user supplied login fields from said Server; and e. replacing said at least one of user supplied login fields with at least one new corresponding login field(s) in said Server.
-
Specification