Claims
- 1-4. (Canceled).
- 5. A method for protecting a network server from being used as the basis of an attack on a network client, the method comprising:
a. restricting access to said network server to a portion of said network server for at least a selected protocol; and b. scanning said portion of said network server for particular characters, said particular characters being associated with said selected protocol.
- 6. The method of claim 5, further comprising removing said particular characters such that a security risk posed by said selected protocol is reduced.
- 7. The method of claim 5, further comprising replacing said particular characters with benign characters such that a security risk posed by said selected protocol is reduced.
- 8. The method of claim 5, wherein said characters are hostile characters and wherein if a request contains any of said hostile characters, the request is rejected.
- 9. The method of claim 5, further comprising logging said particular characters to form a security log.
- 10. The method of claim 9, further comprising reviewing said security log to determine whether said particular characters are hostile.
- 11. The method of claim 5, wherein said protection of the network server is accomplished during an electronic purchase transaction.
- 12. The method of claim 11, wherein the electronic purchase transaction is conducted using a digital wallet.
- 13-42. (Canceled).
- 43. A computer-implemented method for protecting a network server from being used as the basis of an attack on a network client, the method comprising:
a. receiving a request for a connection at said server from said network client; and b. scanning a portion of said network server for particular characters associated with a protocol; c. verifying that any response from said network server to said network client is void of said particular characters; and d. providing said response from said network server to said network client.
- 44. The method of claim 43 further comprising restricting access to said network server for said protocol to said portion of said network server.
- 45. The method of claim 43 further comprising replacing said particular characters with benign characters such that a security risk posed by said selected protocol is reduced.
- 46. The method of claim 43 wherein said protocol comprises javascript.
- 47. The method of claim 43 further comprising logging said particular characters to form a security log.
- 48. The method of claim 47 further comprising reviewing said security log to determine whether said particular characters are hostile.
- 49. The method of claim 47 wherein said protection of the network server is accomplished during an electronic purchase transaction.
- 50. The method of claim 49 wherein the electronic purchase transaction is conducted using a digital wallet.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of: U.S. Provisional Application No. 60/151,880, filed Aug. 31, 1999; U.S. Provisional Application No. 60/164,668, filed Nov. 9, 1999; U.S. Provisional Application No. 60/165,577, filed Nov. 15, 1999; and, U.S. Provisional Application No. 60/201,635, filed May 3, 2000.
Provisional Applications (4)
|
Number |
Date |
Country |
|
60151880 |
Aug 1999 |
US |
|
60164668 |
Nov 1999 |
US |
|
60165577 |
Nov 1999 |
US |
|
60201635 |
May 2000 |
US |
Divisions (1)
|
Number |
Date |
Country |
Parent |
09652899 |
Aug 2000 |
US |
Child |
10821379 |
Apr 2004 |
US |