×

Piggybacking malicious code blocker

  • US 8,196,200 B1
  • Filed: 09/28/2006
  • Issued: 06/05/2012
  • Est. Priority Date: 09/28/2006
  • Status: Active Grant
First Claim
Patent Images

1. A computer system comprising:

  • a memory having stored therein a piggybacking malicious code blocking application; and

    a processor coupled to said memory, wherein execution of said piggybacking malicious code blocking application generates a method comprising;

    determining whether a transaction request has occurred during a transaction session, wherein upon a determination that said transaction request has occurred, said method further comprising;

    following a determination that a transaction request has been made, the transaction request is intercepted by an http proxy which stalls the transaction request until a determination is made that the transaction request is legitimate, the process for determining whether the transaction request is legitimate comprising;

    parsing a first critical value from said transaction request; and

    determining whether said first critical value is legitimate;

    upon a determination that said first critical value is legitimate, said piggybacking malicious code blocking application further performs;

    determining whether said transaction request contains at least one additional critical value to be evaluated as legitimate;

    selecting a second critical value upon a determination that said transaction request does contain said at least one additional critical value; and

    determining whether said second critical value is legitimate.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×