×

Protection against impersonation attacks

  • US 8,296,844 B2
  • Filed: 03/20/2008
  • Issued: 10/23/2012
  • Est. Priority Date: 03/21/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computing method, comprising:

  • running on a user computer a first operating environment for performing general-purpose operations and a second operating environment, which is configured expressly for interacting with a server in a protected communication session and is isolated from the first operating environment, wherein general-purpose operations performed in the first operating environment do not affect operation of the second operating environment, wherein in the protected communication session the second operating environment exchanges transaction data with the server via a security protocol, the first operating environment including an operating system and the second operating environment including an operating system separate from the operating system of the first operating environment, wherein the first operating environment does not interact with the server in the protected communication session;

    detecting by a program running in the second operating environment an illegitimate communication session in the first operating environment that interacts with the first operating environment, including detecting via pattern recognition an impersonation attack that imitates at least a portion of characteristic elements of the protected communication session in the first operating environment to imitate the protected communication session in the first operating environment, wherein the characteristic elements include graphical user interface (GUI) features associated with the protected communication session that are not expected to be used in the first operating environment; and

    automatically inhibiting the detected impersonation attack.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×