Consumer-driven secure sockets layer modulator
First Claim
Patent Images
1. A client computer based method for executing a secure electronic transaction over a communications network, the method comprising:
- querying, by at least one data processor, an exclusion list with a domain name associated with a transaction site to determine if a security of the transaction site needs verification, the exclusion list comprising one or more domains that do not require a secure channel for communication;
when the transaction site is not on the exclusion list and the electronic transaction does not include information sent from the client computer, the electronic transaction being encrypted with a public key, initiating, by at least one data processor, the verification by querying an allowed list with the domain name to determine if the transaction site is allowed to continue the electronic transaction; and
when the domain name of the transaction site is not on the allowed list, by at least one data processor;
generating a first notification for a user indicating that the electronic transaction is being conducted with an unsanctioned transaction site,receiving input from the user based on the first notification, andceasing the electronic transaction, andadding the domain name associated with the transaction site to the exclusion list, the exclusion list being specific to the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A software system and method for executing secure commercial transactions online is disclosed. The system intercepts and verifies, against consumer provided inputs, Secure Socket Layer (SSL) communications from normal Web browser usage. The system can include a software module loaded onto the consumer'"'"'s client computer, and which uses independently-derived look-ups to associate a web domain name with its SSL public key to verify that a given web session is appropriately encrypted.
-
Citations
14 Claims
-
1. A client computer based method for executing a secure electronic transaction over a communications network, the method comprising:
-
querying, by at least one data processor, an exclusion list with a domain name associated with a transaction site to determine if a security of the transaction site needs verification, the exclusion list comprising one or more domains that do not require a secure channel for communication; when the transaction site is not on the exclusion list and the electronic transaction does not include information sent from the client computer, the electronic transaction being encrypted with a public key, initiating, by at least one data processor, the verification by querying an allowed list with the domain name to determine if the transaction site is allowed to continue the electronic transaction; and when the domain name of the transaction site is not on the allowed list, by at least one data processor; generating a first notification for a user indicating that the electronic transaction is being conducted with an unsanctioned transaction site, receiving input from the user based on the first notification, and ceasing the electronic transaction, and adding the domain name associated with the transaction site to the exclusion list, the exclusion list being specific to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A client computer based method for executing a secure electronic transaction over a communications network, the method comprising:
-
intercepting, by at least one data processor, secure socket layer (SSL) communications with a transaction site on a server; and verifying, by at least one data processor, that a web session associated with the SSL communications is appropriately encrypted, the verifying comprising; querying an exclusion list with a domain name of the transaction site to determine if a security of the transaction site needs verification, the exclusion list being specific to a user and comprising one or more domains that do not require a secure channel for communication; when the transaction site is not on the exclusion list and the SSL communications do not include information sent from the client computer, the SSL communications being encrypted with a public encryption key, querying an allowed list with the domain name to determine if the transaction site is allowed to continue the electronic transaction; and when the domain name of the transaction site is not on the allowed list, generating a notification for a user indicating that the electronic transaction is being conducted with an unsanctioned transaction site, receiving input from the user based on the notification, ceasing the electronic transaction, and adding the domain name associated with the transaction site to the exclusion list. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A client system for executing a secure electronic transaction over a communications network, the system comprising:
-
a secure transaction module configured to intercept secure socket layer (SSL) communications from a transaction site on a server; and at least one data processor associated with the secure transaction module, the at least one data processor being configured to verify that a web session associated with the SSL communications is appropriately encrypted by; querying an exclusion list with a domain name of the transaction site to determine if a security of the transaction site needs verification, the exclusion list being specific to a user and comprising one or more domains that do not require a secure channel for communication, when the transaction site is not on the exclusion list and the SSL communications do not include information sent from the client computer, the SSL communications being encrypted with a public encryption key, querying an allowed list with the domain name to determine if the transaction site is allowed to continue the electronic transaction; and when the domain name of the transaction site is not on the allowed list, generating a notification for a user indicating that the electronic transaction is being conducted with an unsanctioned transaction site, receiving input from the user based on the notification, ceasing the electronic transaction, and adding the domain name associated with the transaction site to the exclusion list. - View Dependent Claims (14)
-
Specification