×

Trusted electronic communication through shared vulnerability

  • US 8,261,328 B2
  • Filed: 08/14/2008
  • Issued: 09/04/2012
  • Est. Priority Date: 08/14/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method of providing a client application with access to a requested service provided by a server application, comprising:

  • receiving, from the client application, a request for access to the service provided by the server application, wherein the client application executes on a client system having a vulnerability;

    sending, to the client application, a request that the client application provide access to the vulnerability as a condition to granting the client application the access to the service provided by the server application;

    receiving, from the client application, access to the vulnerability;

    granting the client application with access to the requested service provided by the server application;

    monitoring, by the server application, the client application accessing the requested service; and

    upon determining the client system has performed an unwanted action, by the server application, exploiting the vulnerability to prevent the client system from further performing the unwanted action.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×