Method, computer software, and system for providing end to end security protection of an online transaction
First Claim
Patent Images
1. A non-transitory computer-readable medium storing program instructions executable on a computing device to:
- at the point of entry into a transaction over a wide-area network via a first website, run a malicious code detection program, wherein running the malicious code detection program includes;
executing a plurality of routines;
using results of the plurality of routines to detect whether malicious code is executing on the computing device;
repeatedly re-run the malicious code detection program during the transaction, wherein each re-running of the malicious code detection include re-executing the plurality of routines; and
upon malicious code being detected by the malicious code detection program, provide an indication to a user of the computing device that malicious code has been detected.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for implementing an online transaction security product includes downloading an online transaction security product program from a web site to an information handling system. The security product program includes an anti-malicious code program configured to detect malicious code on the information handling system. Lastly, the security product program is executed, wherein the anti-malicious code program of the security product program operates to detect malicious code on the information handling system.
57 Citations
20 Claims
-
1. A non-transitory computer-readable medium storing program instructions executable on a computing device to:
-
at the point of entry into a transaction over a wide-area network via a first website, run a malicious code detection program, wherein running the malicious code detection program includes; executing a plurality of routines; using results of the plurality of routines to detect whether malicious code is executing on the computing device; repeatedly re-run the malicious code detection program during the transaction, wherein each re-running of the malicious code detection include re-executing the plurality of routines; and upon malicious code being detected by the malicious code detection program, provide an indication to a user of the computing device that malicious code has been detected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium storing program instructions executable on a computing device to facilitate performing a transaction via a first website to:
-
repeatedly re-run a malicious code detection program throughout the duration of the online transaction, wherein re-running the malicious code detection program includes; executing a plurality of routines; using results of the plurality of routines to determine whether malicious code is running on the computing device; and upon the malicious code detection program determining that malicious code is running on the computing device, terminate the online transaction. - View Dependent Claims (12, 13, 14)
-
-
15. A non-transitory computer-readable medium storing program instructions executable on a computing device to facilitate performing a transaction via a first website to:
-
repeatedly re-run a malicious code detection program during the online transaction, wherein re-running the malicious code detection program includes; executing a plurality of routines; using results of the plurality of routines to determine whether malicious code is running on the computing device; and upon the malicious code detection program determining that malicious code is running on the computing device, suspend the online transaction until the malicious code is disabled. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification