Method, system and computer program product for security in a global computer network transaction
First Claim
Patent Images
1. A method, comprising:
- receiving a first request via a browser application running on a first client computer system, wherein said first request is for a first website usable by said first client computer system for performing an online transaction;
subsequent to said first request and prior to completion of the online transaction, sending a first program to said first client computer system, wherein said sending causes the first program to automatically execute repeatedly within said browser application during the online transaction in order to determine whether malicious code is currently running on said first client computer system;
wherein, if the execution of the first program indicates that malicious code is currently running on the first client computer system, perform a corrective action with respect to the malicious code.
7 Assignments
0 Petitions
Accused Products
Abstract
From a first information handling system (“IHS”) to a second IHS, in response to a request for initiating an online transaction, a program is downloaded for detecting malicious code on the second IHS.
95 Citations
36 Claims
-
1. A method, comprising:
-
receiving a first request via a browser application running on a first client computer system, wherein said first request is for a first website usable by said first client computer system for performing an online transaction; subsequent to said first request and prior to completion of the online transaction, sending a first program to said first client computer system, wherein said sending causes the first program to automatically execute repeatedly within said browser application during the online transaction in order to determine whether malicious code is currently running on said first client computer system; wherein, if the execution of the first program indicates that malicious code is currently running on the first client computer system, perform a corrective action with respect to the malicious code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system, comprising:
-
a processor subsystem; and a memory, including program instructions executable by said processor subsystem to; receive a first request via a browser application running on a first client computer system, wherein said first request is for a first website usable by said first client computer system for performing an online transaction; subsequent to said first request and prior to completion of the online transaction, send a first program to said first client computer system, causing said first program to automatically execute repeatedly within said browser application during the online transaction in order to determine whether malicious code is currently running on said first client computer system; wherein, if the execution of the first program indicates that malicious code is currently running on the first client computer system, perform a corrective action with respect to the malicious code. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer-readable memory medium, including program instructions executable to:
-
receive a first request via a browser application running on a first client computer system, wherein said first request is for a first website usable by said first client computer system for performing an online transaction; subsequent to said first request and prior to completion of the online transaction, send a first program to said first client computer system, causing said first program to automatically execute repeatedly within said browser application during the online transaction in order to determine whether malicious code is currently running on said first client computer system; wherein, if the execution of the first program indicates that malicious code is currently running on the first client computer system, perform a corrective action with respect to the malicious code. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A system, comprising:
-
a server hosting a first website that is usable by various client computer systems for performing online transactions; a first client computer system storing program instructions executable to send a request, via a browser application, to the first website to perform a first online transaction; wherein the sewer stores program instructions executable to send, subsequent to the request, a first program to the first client computer system, wherein the first program is repeatedly executable on the first client computer system prior to completion of the first online transaction to determine whether malicious code is currently running on the first client computer system; wherein, if the execution of the first program indicates that malicious code is currently running on the first client computer system, perform a corrective action. - View Dependent Claims (32, 33, 34, 35, 36)
-
Specification