PROTECTING SENSITIVE WEB TRANSACTIONS USING A COMMUNICATION CHANNEL ASSOCIATED WITH A USER
1 Assignment
0 Petitions
Accused Products
Abstract
A security device may receive, from a client device, a request associated with a server device. The security device may determine a communication channel and contact information for validating the request. The security device may provide validation information via the communication channel using the contact information. The security device may receive a validation response from the client device, and may determine whether the validation response is valid. The security device may selectively perform a first action or a second action based on determining whether the validation response is valid. The first action may be performed based on determining that the validation response is valid, and may include providing a validation indicator, with the request, to the server device. The second action may be performed based on determining that the validation response is not valid, and may include providing an invalidation indicator, with the request, to the server device.
-
Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A device, comprising:
one or more processors to; receive, from a client device and via a first communication channel, a request associated with a server device; determine a sensitivity level associated with the request; determine, based on the sensitivity level, a second communication channel for validating the request, the second communication channel being different from the first communication channel; determine contact information for contacting a user, associated with the request, via the second communication channel; transmit, via the second communication channel and using the contact information, validation information; receive a validation response from the client device; determine, based on the validation information and the validation response, whether the validation response is valid; and perform an action based on determining whether the validation response is valid. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
28. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors, cause the one or more processors to; receive, from a client device and via a first communication channel, a request that identifies a server device as a destination for the request; determine, based on a sensitivity level associated with the request, a second communication channel for validating the request, the second communication channel being different from the first communication channel; determine contact information for contacting a user, associated with the request, via the second communication channel; transmit, via the second communication channel and using the contact information, validation information; receive a validation response from the client device after transmitting the validation information; determine, based on the validation information and the validation response, whether the validation response is valid; and perform an action based on determining whether the validation response is valid. - View Dependent Claims (29, 30, 31, 32, 33)
-
34. A method, comprising:
-
receiving, by a security device and via a first communication channel, a request by a first device to access a second device; determining, by the security device, a sensitivity level associated with the request; determining, by the security device and based on the security level, at least one of; a second communication channel for validating the request, the second communication channel being different from the first communication channel, or contact information for contacting a user, associated with the request, via the second communication channel; transmitting, by the security device, validation information via the second communication channel and using the contact information; receiving, by the security device, a validation response from the first device after transmitting the validation information; determining, by the security device, whether the validation response is valid based on the validation information and the validation response; and performing, by the security device, an action based on determining whether the validation response is valid. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
Specification