Log in
Enquire now
‌

US Patent 10216488 Intercepting and injecting calls into operations and objects

Patent 10216488 was granted and assigned to Shape Security on February, 2019 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Applicant
Shape Security
Shape Security
0
Current Assignee
Shape Security
Shape Security
0
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
102164880
Patent Inventor Names
Jarrod Overson0
Siying Yang0
Date of Patent
February 26, 2019
0
Patent Application Number
150696670
Date Filed
March 14, 2016
0
Patent Citations Received
‌
US Patent 11405363 File upload control for client-side applications in proxy solutions
‌
US Patent 11036619 Bypassing execution of a module in real-time
0
‌
US Patent 11074069 Replaying interactions with transactional and database environments with re-arrangement
‌
US Patent 11748460 Procedural code generation for challenge code
‌
US Patent 11308259 Web element retargeting
‌
US Patent 11349816 Obfuscating source code sent, from a server computer, to a browser on a client computer
‌
US Patent 10846356 Scalable whittled proxy execution for low-latency web over cellular networks
‌
US Patent 10915426 Intercepting and recording calls to a module in real-time
...
Patent Primary Examiner
‌
Duy Khuong T Nguyen
0
Patent abstract

A computer implemented method for improving security of a server computer that is configured to deliver computer program instructions to a remote client computer, and comprising, using an intermediary computer that is topologically interposed between the server computer and the remote client computer is provided. The intermediary computer is configured to intercept a first set of source code instructions from the server computer. The intermediary computer identifies first party operations that include operations on objects and the objects themselves. The intermediary computer identifies a first set of operations within the first party operations that are configured to define values for one or more objects based on one or more constants. The intermediary computer then generates a second set of operations, where the second set of operations are configured to define same values for the one or more objects, when executed by a web browser on the client computer. The intermediary computer transforms the first party operations into transformed first party operations by substituting the first set of operations with the second set of operations. The intermediary computer generates a second set of source code instructions that are based on the first set of source code instructions and the transformed first party operations. The intermediary computer then sends the second set of source code instructions to the client computer.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 10216488 Intercepting and injecting calls into operations and objects

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.