SYSTEM AND METHOD FOR PROTECTING DATA ACCESSED THROUGH A NETWORK CONNECTION
First Claim
1. A method for protecting data accessed through a network connection, comprising:
- transferring security software from an external memory device of a client computer to an internal memory device of the client computer that is operative to protect data communicated to and from the client computer via at least one communications link by providing at least one web browser which executes in user mode on a trusted secure desktop operative to run simultaneously with an unsecure desktop of the client computer.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems (100) and methods (400) for protecting data accessed through a network connection. The methods involve transferring security software (150) from an external memory device of a client computer (102) to an internal memory device of the client computer. The security software is operative to protect data communicated to and from the client computer via communication links. The security software is also operative to provide a web browser (1101, 1102, . . . , 110p) which executes in user mode on a trusted secured desktop (904) configured to run simultaneously with an unsecured desktop (902) of the client computer. The security software is further operative to provide a security service to the web browser. The security service includes at least one service selected from the group consisting of a keylogger prevention service, a code injection prevention service, and a screen scraper protection service.
-
Citations
41 Claims
-
1. A method for protecting data accessed through a network connection, comprising:
transferring security software from an external memory device of a client computer to an internal memory device of the client computer that is operative to protect data communicated to and from the client computer via at least one communications link by providing at least one web browser which executes in user mode on a trusted secure desktop operative to run simultaneously with an unsecure desktop of the client computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
23. A network based system for protecting data accessed by a computer system through a network connection, comprising:
-
a first network site system offering a network based service for protecting the data accessed through the network connection, the first network site system configured for transferring security software from a first memory device of the first network site to a second memory device of a client computer, the security software being operative to protect data communicated to and from the client computer via a communications link; wherein the security software includes a web browser which executes in user mode on a trusted secure desktop operative to run simultaneously with an unsecure desktop of the client computer. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A network based system including at least one client computer, comprising:
-
at least one server computer provided by a first business organization offering a network based service for protecting data accessed through a network connection, the server computer configured for communicating with the client computer via a first secure communication link established between the server computer and the client computer, performing a domain name resolution to translate a domain name to a secure numerical identifier associated with a second network site system provided by a second business organization different from the first business organization for purposes of locating and addressing the second network site system, communicating the secure numerical identifier to the client computer over the first secure communication link, and facilitating a second secure communications link between the client computer and the second network site system. - View Dependent Claims (41)
-
Specification