Check Point Software Technologies Ltd.
Web injection protection method and system

Last updated:

Abstract:

Computerized methods and systems detect unauthorized and potentially malicious, as well as malicious records, typically in the form of electronic forms, such as those where users input information (into input blocks or fields), such as bank and financial institution electronic forms and the like. Should such an unauthorized form, be detected, the detection causes the taking of protective action by the computer whose on whose browser the unauthorized form has been rendered.

Status:
Grant
Type:

Utility

Filling date:

13 Oct 2015

Issue date:

2 Nov 2021