Check Point Software Technologies Ltd.
Web injection protection method and system
Last updated:
Abstract:
Computerized methods and systems detect unauthorized and potentially malicious, as well as malicious records, typically in the form of electronic forms, such as those where users input information (into input blocks or fields), such as bank and financial institution electronic forms and the like. Should such an unauthorized form, be detected, the detection causes the taking of protective action by the computer whose on whose browser the unauthorized form has been rendered.
Status:
Grant
Type:
Utility
Filling date:
13 Oct 2015
Issue date:
2 Nov 2021