Management of dynamic credentials

    公开(公告)号:US11552936B2

    公开(公告)日:2023-01-10

    申请号:US15658129

    申请日:2017-07-24

    Abstract: In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.

    Intercepting and supervising calls to transformed operations and objects
    5.
    发明授权
    Intercepting and supervising calls to transformed operations and objects 有权
    拦截和监督转换操作和对象的调用

    公开(公告)号:US08954583B1

    公开(公告)日:2015-02-10

    申请号:US14159374

    申请日:2014-01-20

    Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.

    Abstract translation: 在一个实施例中,一种方法包括从服务器计算机截取定义一个或多个对象的第一组指令和至少部分地基于所述一个或多个对象的一个​​或多个原始操作; 通过添加至少部分地基于所述一个或多个对象的一个​​或多个主管操作来修改所述第一组指令; 将所述一个或多个原始操作转换成至少部分地基于所述一个或多个主管操作来生成一个或多个转换操作; 呈现定义一个或多个监督器操作和一个或多个变换操作的第二组指令; 将第二组指令发送到远程客户端计算机。

    Variable runtime transpilation
    6.
    发明授权

    公开(公告)号:US10855696B2

    公开(公告)日:2020-12-01

    申请号:US15059080

    申请日:2016-03-02

    Abstract: In an approach, an apparatus comprises: one or more processors; a processor logic coupled to the one or more processors and configured to: intercept, from a client computer, a request directed to a server computer that identifies a purported user agent executing on the client computer; send, to the server computer, the request from the client computer; intercept, from the server computer, one or more original instructions to be executed by the purported user agent of the client computer; determine one or more features supported by the purported user agent that are not utilized by the one or more original instructions; transform the one or more original instructions into one or more revised instructions which, when executed by the purported user agent, cause the purported user agent to utilize the one or more features; send, to the client computer, the one or more revised instructions.

    Management of dynamic credentials

    公开(公告)号:US09716702B2

    公开(公告)日:2017-07-25

    申请号:US14738913

    申请日:2015-06-14

    Abstract: In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.

    Client/server security by an intermediary rendering modified in-memory objects
    10.
    发明授权
    Client/server security by an intermediary rendering modified in-memory objects 有权
    客户端/服务器的安全性由中间层渲染修改的内存中对象

    公开(公告)号:US09270647B2

    公开(公告)日:2016-02-23

    申请号:US14099437

    申请日:2013-12-06

    Inventor: Justin Call

    Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.

    Abstract translation: 在一个实施例中,一种方法包括从服务器计算机拦截定义一个或多个对象的第一组指令和至少部分地基于所述一个或多个对象的一个​​或多个操作; 在存储器中产生对应于所述一个或多个对象的一个​​或多个数据结构; 对所述一个或多个数据结构执行所述一个或多个操作; 响应于执行所述一个或多个操作来更新所述一个或多个数据结构以产生一个或多个更新的数据结构; 呈现第二组指令,当由远程客户端计算机执行时,远程客户端计算机在远程客户端计算机上的存储器中生成更新的数据结构,其中第二组指令与第一组指令不同; 将第二组指令发送到远程客户端计算机。

Patent Agency Ranking