G06F21/128

Using hash signatures of DOM objects to identify website similarity

Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., shingles), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.

COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND RECORDING MEDIUM

A communication device is installed in between a client terminal and a web server which performs communication with the client terminal. The communication device includes a memory, and processing circuitry coupled to the memory and configured to of information included in communication between the web server and the client terminal, perform obfuscation with respect to information related to web application, and send communication, which includes information obfuscated at the performing, to destination.

Limited-resource java card device

A card device is adapted to accept a load packet for an applet and to process and apply to the load packet an INSTALL command in order to prompt an installation of an instance of the applet in the card device. The INSTALL command is adapted to set up in the card device an application identifier comprised in the loading package that relates to the instance of the applet to be installed. The INSTALL command is adapted to install the applet instance while considering the application identifier and to set up in the card device at least one further application identifier that relates to the same instance of the applet.

Systems and methods for facilitating secure streaming of electronic gaming content

A game identifier of an encrypted streaming electronic game to be streamed to a playback device may be received. The game identifier may comprise a title of the encrypted streaming electronic game. An electronic ticket for access by the playback device to a secured portion of the encrypted streaming electronic game may be gathered. The electronic ticket may specify a first gameplay state. The electronic ticket may be used to access the secured portion of the encrypted streaming electronic game at the first gameplay state. One or more gameplay actions to transform the encrypted streaming electronic game to a second gameplay state may be received. The second gameplay state may be provided to a state server, where the state server configured to instruct a license server to modify the electronic ticket to specify the second gameplay state for the encrypted streaming electronic game.

Page display by hosted browser within controlling browser

Web pages compatible with different web browsers are seamlessly rendered within the same tab of a single web browser window. A first browser is executed in a computing device, and has an open browser window. A request is received at the first browser to navigate to a first page. The first page is determined to be incompatible with the first browser and compatible with a second browser. Under control by the first browser, an instance of the second browser is invoked without a browser window opening for the instance of the second browser. An address of the first page is provided to the instance of the second browser. The instance of the second browser renders the first page within a tab in the open browser window of the first browser.

Segregated user-uploaded plugins to avoid affecting co-hosted websites

Disclosed embodiments relate to website hosting implemented in a server environment. Operations include co-hosting, on a hosting server, a plurality of websites generated by a plurality of users; making available to the plurality of users common editing tools; preventing at least some of the plurality of users from altering co-hosted specific websites generated by others of the plurality of users; generating an interface for enabling the at least one subset of the plurality of users to upload to the hosting server plugin code associated with plugins for the co-hosted specific websites generated by the at least one subset of the plurality of users; storing the user-uploaded plugin code; and securely enabling, using an isolation mechanism, at least one of execution of front-end plugin functionality code at the client or execution of back-end plugin functionality code at the plugin server.

Information rights management through editors implemented in a browser

A system and method is described for implementing or managing IRM controls over digital content through a browser. The computer implementing or managing IRM controls over digital content through a browser includes at least one user device and a server. The user device includes a browser, the server comprises a database to store a plurality of IRM rights data and corresponding user permission, an identifier module to identify the user, an editor module to allow the user to view, edit, copy, paste and print the digital content based on the user permission defined for any respective protected document within the user device or downloaded through the Internet.

IDENTIFYING PHISHING WEBSITES USING DOM CHARACTERISTICS

Embodiments of the present invention are directed to identifying phishing websites by rendering and analyzing document object model (DOM) objects associated with a website for features that indicate phishing behavior. Embodiments analyze the full scope and functionality associated with a website by executing functions embedded in a DOM object before analyzing the website for phishing activity. Accordingly, embodiments render and analyze a fully executed DOM object for phishing behavior. Embodiments may then perform steps to mediate a website that is classified as performing phishing. Thus, embodiments are configured to (1) collect website information from a variety of websites and web servers connected to the internet, (2) analyze the collected data to determine whether the website information is performing phishing, and (3) mediate websites and other actors that are determined to be performing phishing based on the results of the phishing analysis.

WEB APPLICATION EXECUTION WITH SECURE ELEMENT EXTENSION
20200193042 · 2020-06-18 ·

Various examples are directed to systems and methods for executing a web application with client-side encryption, A web browser can receive a document comprising a plurality of data elements including a secure element that comprises an encrypted value. An extension component may generate a secure container element to replace the secure element. The extension component can also insert a subdocument into the secure container element. The web browser may be configured to prevent web applications from accessing the subdocument. The extension component may also decrypt the encrypted value to generate a clear value and write the clear value to the subdocument. The web browser may render the document using the clear value.

Account login method and apparatus

A method is provided in which a JavaScript (JS) SDK file is called by an application. A plurality of login paths for logging in to the application is encapsulated in the JS SDK file. When the application is started, a running environment of the application is detected by using the JS SDK file. A login path supported by the running environment is determined by using the JS SDK file. Further, a first login path is sent to the application by using the JS SDK file. The first login path is the login path supported by the running environment and is one of the plurality of login paths.