G06F21/128

PRESENTING PROGRAMS FOR EXECUTION VIA VARIOUS PRESENTABLE MEDIA
20210117516 · 2021-04-22 ·

The disclosure provides for presenting programs in a scripting language. Examples include receiving a data stream containing computer executable instructions in an interpreted language; generating a verification code; publishing, on a media, the data stream and the verification code; reading, using a sensor, the published data stream and verification code at a reader node; receiving user input; based at least on the verification code or the received user input, determining permission to execute, by the reader node, the computer executable instructions; and based at least on determining that execution is permitted by the reader node, executing at least a portion of the computer executable instructions using an interpreted language execution environment on the reader node. For some examples, the media includes a matrix barcode (e.g., a QR code) or a smart card. Some examples leverage a remote verification node and/or a remote library of executable functions.

BROWSER SIGNAL COLLECTION FOR DETECTION OF AUTOMATED ACTIVITY IN BROWSER SESSION
20230409702 · 2023-12-21 ·

Systems, methods, apparatuses, and computer program products for online form logging malicious or bot activity detection. The method may include, initiating an event logging procedure on a webpage. The method may also include listening to one or more event types via the form detection procedure on the webpage. The method may further include measuring a timing between each of the one or more events. In addition, the method may include aggregating the one or more events and the timing between each of the one or more events into an array. Further, the method may include transmitting the array to a server device to determine, based on the array, whether there is human activity or bot activity.

MEDIA DISTRIBUTION SYSTEM WITH MANIFEST-BASED ENTITLEMENT ENFORCEMENT
20210075769 · 2021-03-11 ·

A method for enforcing entitlements includes configuring a wide variety of entitlements at a server; determining applicable combination of entitlements for a given client request; sending entitlements to the requesting client securely; handling entitlement information securely on a plurality of client devices at run time; storing entitlement information securely on a plurality of client devices for offline use; and enforcing entitlements on a plurality of client devices. The method employs manipulation of manifest files by a proxy that may be included in the client device or located in the network.

SECURING WEBPAGES, WEBAPPS AND APPLICATIONS

A method for securing a webpage or a webapp processed by a browser executing on a client system, the method comprising the browser executing an instance of white-box protected code, wherein execution of the instance of white-box protected code causes the client system to: generate a message comprising message data for use by a control system to perform one or more security tests, the control system communicably connected to the client system via a network; send the message to the control system to enable the control system to perform the one or more security tests using the message data; receive a response from the control system based, at least in part, on the message; and process the response.

THREAT DETECTION METHOD AND APPARATUS, AND NETWORK SYSTEM
20210081526 · 2021-03-18 ·

Example threat detection methods and apparatus are disclosed. One example method includes obtaining page code of a first display page group identified by a uniform resource locator (URL) and an overall size occupied by the first display page group in a display area of a browser of a Web sandbox when loading the URL in the browser. After preset dynamic code is injected into the page code of the first display page group, the page code is parsed and executed. A request message is sent when a value of a display variable is greater than or equal to a preset value, to request to obtain page code of a second display page group. A response message that carries the page code of the second display page group is received. It is further detected, in the Web sandbox, whether the page code of the second display page group carries attack code.

Authentication translation
10929512 · 2021-02-23 · ·

Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.

Systems and methods for dynamically restricting the rendering of unauthorized content included in information resources
10951634 · 2021-03-16 · ·

Systems and methods for dynamically restricting rendering of unauthorized content included in information resources are provided herein. A computing device can identify an information resource including a content object specifying one or more graphical characteristics. The computing device can determine that the content object corresponds to a restricted content object by applying at least one of an action-based detection policy to detect actions performed on the information resource or a visual-based detection policy to detect the graphical characteristics of the content object. The computing device can modify by applying a content rendering restriction policy the information resource to alter rendering of the content element on the information resource responsive to the determination.

ANALYSIS APPARATUS, ANALYSIS METHOD, AND ANALYSIS PROGRAM

An analysis apparatus includes a category classification unit that accesses a URL of an analysis target Web page and classifies the analysis target Web page into a category, an operation target detection unit that detects an operation target of user operation from the analysis target Web page in accordance with a detection method that is set in advance for the classified category, an operation execution unit that performs operation on the detected operation target, a function hook unit that detects an operation event that occurs after the operation has been performed on the operation target, and a log output unit that outputs log data in which communication that has occurred due to the operation, the detected operation event, and a Web browser screen that has been changed due to the operation are associated with the URL of the analysis target Web page.

Editing a database during preview of a virtual web page

Disclosed embodiments relate to updating a back-end database containing data sets that populate a plurality of web pages of a website. Operations include receiving via a user interface, a plurality of data elements; storing groups of at least one data element in a database; generating a plurality of virtual web pages, wherein each virtual web page is a preview of a corresponding actual web page before the corresponding actual web page goes live; displaying each group of at least one data element in a separate one of the plurality of virtual web pages; displaying an editing tool to permit a user to edit a virtual web page from the plurality of virtual web pages; translating the edits to the virtual web page into updates for the database; storing the updates in the database; and enabling a display on the corresponding actual web page with the updates.

LOCAL SECURE RENDERING OF WEB CONTENT
20210064739 · 2021-03-04 ·

A technique for securely rendering content downloaded over a network includes parsing a downloaded web page into a DOM (Document Object Model) tree and splitting the DOM tree into multiple DOM instances, where each DOM instance is dedicated to a respective type of web content. The technique processes each DOM instance using a respective render engine, which implements the security policy on the respective type of web content by blocking or altering content, and/or by limiting functionality that may be used in connection with the content.