Management of calls to transformed operations and objects

    公开(公告)号:US10652275B2

    公开(公告)日:2020-05-12

    申请号:US15945944

    申请日:2018-04-05

    Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.

    Reverse proxy computer: deploying countermeasures in response to detecting an autonomous browser executing on a client computer

    公开(公告)号:US10326790B2

    公开(公告)日:2019-06-18

    申请号:US15430224

    申请日:2017-02-10

    Abstract: A computer system configured to improve security of server computers interacting with client computers, the system comprising: one or more processors executing instructions that cause the one or more processors to: select, from the plurality of detection tests, one or more first detection tests to be performed by a client computer; send, to the client computer, a first set of detection instructions that define the one or more first detection tests, and which when executed causes generating a first set of results that identifies a first set of characteristics of the client computer; receive the first set of results from the client computer; select one or more first countermeasures from a plurality of countermeasures based on the first set of characteristics identified in the first set of results; send, to the client computer, a first set of countermeasure instructions that define the one or more first countermeasures.

    Browser extension firewall
    4.
    发明授权

    公开(公告)号:US10212130B1

    公开(公告)日:2019-02-19

    申请号:US14942769

    申请日:2015-11-16

    Abstract: Methods and apparatus are described for detecting browser extensions. Specific implementations relate to configurable security policies and automated actions performed in response to the detection of browser extensions.

    Intercepting and supervising calls to transformed operations and objects
    10.
    发明授权
    Intercepting and supervising calls to transformed operations and objects 有权
    拦截和监督转换操作和对象的调用

    公开(公告)号:US08954583B1

    公开(公告)日:2015-02-10

    申请号:US14159374

    申请日:2014-01-20

    Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.

    Abstract translation: 在一个实施例中,一种方法包括从服务器计算机截取定义一个或多个对象的第一组指令和至少部分地基于所述一个或多个对象的一个​​或多个原始操作; 通过添加至少部分地基于所述一个或多个对象的一个​​或多个主管操作来修改所述第一组指令; 将所述一个或多个原始操作转换成至少部分地基于所述一个或多个主管操作来生成一个或多个转换操作; 呈现定义一个或多个监督器操作和一个或多个变换操作的第二组指令; 将第二组指令发送到远程客户端计算机。

Patent Agency Ranking