ANTI-PHISHING SYSTEM AND METHOD INCLUDING LIST WITH USER DATA
First Claim
Patent Images
1. A method comprising:
- receiving a request to conduct a transaction; and
,providing a user interface to a user in response to the request, wherein the user interface includes a list of candidate identification tokens, wherein the list of candidate identification tokens includes an authentic identification token and one or more non-authentic identification tokens, wherein the authentic identification token is associated with a user account.
1 Assignment
0 Petitions
Accused Products
Abstract
A server computer is disclosed. It comprises a processor and a computer readable medium coupled to the processor. The computer readable medium comprises code executable by the processor for implementing a method comprising: (i) receiving a request to conduct a transaction, (ii) providing a user interface to a user in response to the request, wherein the user interface includes a list of candidate identification tokens, wherein the list of candidate identification tokens includes an authentic identification token and one or more non-authentic identification tokens, wherein the authentic identification token is associated with a user account.
251 Citations
20 Claims
-
1. A method comprising:
-
receiving a request to conduct a transaction; and
,providing a user interface to a user in response to the request, wherein the user interface includes a list of candidate identification tokens, wherein the list of candidate identification tokens includes an authentic identification token and one or more non-authentic identification tokens, wherein the authentic identification token is associated with a user account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An anti-phishing system comprising:
-
a database comprising of one or more user profiles a server computer coupled to the database, wherein the server computer comprises a processor and a computer-readable storage medium coupled to the processor, the computer readable storage medium comprising code executable by the processor for implementing a method comprising; receiving a request to conduct a transaction; providing a user interface to a user in response to the request, wherein the user interface includes a list of candidate identification tokens, wherein the list of candidate identification tokens includes an authentic identification token and one or more non-authentic identification tokens, wherein the authentic identification token is associated with a user account. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method comprising:
-
requesting to conduct a transaction; receiving a user interface including a list of candidate identification tokens, wherein the list of candidate identification tokens includes an authentic identification token and one or more non-authentic identification tokens at a user device; and
,selecting an identification token from the list of candidate identification tokens. - View Dependent Claims (17, 18, 19, 20)
-
Specification