DYNAMIC CRYPTOGRAPHIC POLYMORPHISM (DCP) SYSTEM AND METHOD
First Claim
1. A method of enhancing the security of an internet transaction which includes the transmission of structurally formatted information, the method including the steps of:
- transmitting a request for the structurally formatted information across a network environmentreceiving the request and sending a formulated response, instead of a normal response of form data, but including a seed requiring calculation and decoding to determine an answer based on the seedwherein the browser determines data that, when combined with the seed produces a correct hash value;
, andreceiving the structurally formatted information.
1 Assignment
0 Petitions
Accused Products
Abstract
Described herein is a method of enhancing the security of an internet transaction which includes the transmission of structurally formatted information, the method including the steps of: transmitting a request for the structurally formatted information across a network environment; receiving the request and sending a formulated response requiring calculation and decoding to determine the nature and content of the structurally formatted information; and receiving the structurally formatted information.
32 Citations
26 Claims
-
1. A method of enhancing the security of an internet transaction which includes the transmission of structurally formatted information, the method including the steps of:
-
transmitting a request for the structurally formatted information across a network environment receiving the request and sending a formulated response, instead of a normal response of form data, but including a seed requiring calculation and decoding to determine an answer based on the seed wherein the browser determines data that, when combined with the seed produces a correct hash value;
, andreceiving the structurally formatted information. - View Dependent Claims (2, 3)
-
-
4. A method as claimed in claim l, wherein the complexity of the formulated response is altered in accordance with a calculated level of risk of insecurity of the network.
-
5. A system providing against malicious attacks over a network, the system including:
-
at least one client-side computer and at least one server-side computer interconnected over a network; the at least one client-side computer despatching a first message request for structured information to the at least one server-side computer; the at least one server-side computer providing a structured response, instead of a normal response of form data, but including seed information to the client-side computer, and the client-side computer determining an answer based on the seed, wherein software determines data that, when combined with the seed produces a correct hash value in the form of a response.
-
-
6. In an internet query and answer environment, where a server accepts structured queries from an externally located client over a network, a method of rate limiting the submission of valid data over the network, the method including the steps of:
-
(a) receiving a first structured query request from the client over the network.; (b) providing an encrypted answer in response to the request, the encrypted answer requiring the exercise of a computational resource of a first expected level by the client to determine an answer by the client; (c) receiving a second response to the encrypted answer and determining if the second response includes a correct answer; and (d) upon receipt of a correct answer, processing said second response as a valid response. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A client-side system for enhancing the security of an internet transaction, the system including
a processor, a memory, and a network connection, each operatively coupled together; wherein, the client-side system operates to receive structurally formatted information including a seed used in a calculation to determine an answer based on the seed, wherein a browser determines the answer data that, when combined with the seed produces a correct hash value, and sends the answer data to a server for the purpose of subsequently receiving structurally formatted information. - View Dependent Claims (12, 13, 14)
-
15. A server-side system for enhancing the security of an internet transaction, the system including
a processor, a memory, and a network connection, each operatively coupled together; wherein, the server-side system operates to send structurally formatted information including a seed used in a calculation to determine an answer based on the seed, and, the server-side system receives a correct hash value, and in response, structurally formatted information. - View Dependent Claims (16, 17, 18)
-
19. A computer readable memory operatively coupled to a client-side system for enhancing the security of an internet transaction, the computer readable memory instructing:
-
a processor with a network connection; wherein, the client-side system operates to receive structurally formatted information including a seed used in a calculation to determine an answer based on the seed, wherein a browser determines the answer data that, when combined with the seed produces a correct hash value, and sends the answer data to a server for the purpose of subsequently receiving structurally formatted information. - View Dependent Claims (20, 21, 22)
-
-
23. A computer readable memory operatively coupled to a server-side system for enhancing the security of an internet transaction, the computer readable memory instructing:
-
a processor with a network connection; wherein, the server-side system operates to send structurally formatted information including a seed used in a calculation to determine an answer based on the seed, and, the server-side system receives a correct hash value, and in response, sends structurally formatted information. - View Dependent Claims (24, 25, 26)
-
Specification