CLIENT SIDE ACTIONS VALIDATION
First Claim
1. A system comprising:
- a display;
a memory storing processor-executable process steps; and
a processor to execute the processor-executable process steps to cause the system to;
receive a first request at a server;
generate a first dataset and a second dataset at the server, wherein the second dataset is encrypted;
transmit the first and second dataset to a client;
receive at the server a second request and the encrypted dataset, wherein the second request includes a request to execute an action with at least one data element in the first data set; and
in response to receipt of the second request and encrypted dataset, decrypt the encrypted dataset to validate the second request.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system including a display; a memory storing processor-executable process steps; and a processor to execute the processor-executable process steps to cause the system to: receive a first request at a server; generate a first dataset and a second dataset at the server, wherein the second dataset is encrypted; transmit the first and second dataset to a client; receive at the server a second request and the encrypted dataset, wherein the second request includes a request to execute an action with at least one data element in the first data set; and in response to receipt of the second request and encrypted dataset, decrypt the encrypted dataset to validate the second request. Numerous other aspects are provided.
-
Citations
20 Claims
-
1. A system comprising:
-
a display; a memory storing processor-executable process steps; and a processor to execute the processor-executable process steps to cause the system to; receive a first request at a server; generate a first dataset and a second dataset at the server, wherein the second dataset is encrypted; transmit the first and second dataset to a client; receive at the server a second request and the encrypted dataset, wherein the second request includes a request to execute an action with at least one data element in the first data set; and in response to receipt of the second request and encrypted dataset, decrypt the encrypted dataset to validate the second request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method comprising:
-
receiving a first request at a server; generating a first dataset and a second dataset at the server, wherein the second dataset is encrypted; transmitting the first and second dataset to a client; receiving at the server a second request and the encrypted dataset, wherein the second request includes a request to execute an action with at least one data element in the first data set; in response to receipt of the second request and the encrypted dataset, decrypting the encrypted dataset to validate the second request; and approving or declining the second request in response to decrypting the encrypted dataset. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium storing program code, the program code executable by a computer system to cause the computer system to:
-
receive a first request at a server; generate a first dataset and a second dataset at the server, wherein the second dataset is encrypted; transmit the first and second dataset to a client; receive at the server a second request and the encrypted dataset, wherein the second request includes a request to execute an action with at least one data element in the first data set; in response to receipt of the second request, decrypt the encrypted dataset to validate the second request; and determine if the second request is valid. - View Dependent Claims (17, 18, 19, 20)
-
Specification