Patent classifications
G06F21/128
Dynamic selection of authorization processes
Technology is disclosed herein for licensing applications using a preferred authorization process dynamically identified based on conditions associated with an initiation of an application. Authorization is then attempted using the preferred authorization process. In some examples, the preferred authorization process is selected from at least a keyless authorization process and a key-based authorization process.
RELEVANCY IMPROVEMENT THROUGH TARGETING OF INFORMATION BASED ON DATA GATHERED FROM A NETWORKED DEVICE ASSOCIATED WITH A SECURITY SANDBOX OF A CLIENT DEVICE
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device are disclosed. In one embodiment, a system may comprise a networked device, a relevancy-matching server, and a client device. The networked device may be configured to generate a preliminary data and/or a primary data associated with a user and automatically announce a sandbox-reachable service of the networked device to a discovery module. The relevancy-matching server may be configured to match a targeted data with the primary data based on a relevancy factor associated with the user. The client device may be configured to automatically process an identification data of the networked device and/or the sandbox-reachable service of the networked device from the discovery module and to automatically associate with the networked device based on the identification data.
URL MANAGEMENT IN IMAGE FORMING APPARATUS
An example image forming apparatus comprises a user interface device, a processor, and a memory storing instructions executable by the processor. The processor executes the instructions to perform a reliability determination for a uniform resource locator (URL) of a web page to be accessed according to execution of an application, provide a reliability determination result for the URL through the user interface device, and manage a URL list of URLs based on the reliability determination result, the URLs included in the URL list having recognized reliability.
ON-DEMAND WEB-SERVER EXECUTION INSTANCE FOR WEBSITE HOSTING WITH CUSTOM BACK-END FUNCTIONALITY
An online website building system includes: an online database configured to store a library of website building elements for configuring a front-end of a webpage, the webpage having been built on a platform including at least common server code; and store rules for accessing code associated with the website building elements; and at least one processor configured to enable the user to edit code associated with a webpage, and to provide a programmable event for activating the resultant user-editable code, wherein the user-editable code is configured to provide dynamic customized back-end functionality associated with the webpage; store the edited user-editable code in a code storage system in communication with the online database; receive a request to access the webpage, and in response to the request and before the request times out, provide access to a virtualized execution instance comprising at least the common server code and the edited user-editable code.
SYSTEM AND METHOD FOR SECURING A BROWSER AGAINST FONT USAGE FINGERPRINTING
In a method for securing a web browser, display instructions for displaying web content are received from a content server by a web browser operating on a client computing device. The web browser creates a document object using the display instructions and determines from the document object whether one or more of the display instructions meet font profiling criteria selected to identify attempts to profile font display characteristics of the web browser. Responsive to a determination that font profiling criteria are met, the web browser alters a character display of the document object and implements the document object for displaying the web content on the client computing device.
SYSTEMS AND METHODS FOR REMOTELY VERIFYING IDENTITY OF NON-RESIDENT ALIENS
A method for remotely verifying a non-resident alien's identity, includes: receiving a request to establish a communication session from a user device; analyzing the request to determine whether the user device is compromised; in response to determining that the user device is not compromised, providing a page flow to the user device to solicit information from the non-resident alien, the information including identity information associated with a local foreign government identification document (ID), and other information not shown on the local foreign government ID; querying one or more foreign governmental data stores to identify foreign data associated with the non-resident alien based on a unique identifier associated with the local foreign government ID; comparing the information with the foreign data; and verifying an identity of the non-resident alien based on the comparing, wherein the verifying includes determining that at least one of the other information matches the foreign data.
Method and apparatus to detect security vulnerabilities in a web application
An improved anti-malware protection system protects computers against exploits in a scripting language that may be run in a browser. The system comprises a recorder that records scripting language execution events, a trace generator that transforms the recorded scripting language execution events into an execution trace, and a security engine that scans the execution trace and advises a security software about exploits found in the execution trace. By hooking the recorder into a runtime application programming interface for the scripting language, the improved protection system can detect exploits dynamically without the need for a browser-dependent plugin. An optional plugin can be included to perform file-based analysis of the script in addition to the runtime analysis of the script. The system can provide an application programming interface that can be used by multiple security software programs from multiple vendors to create an enhanced security software product.
TRUSTED SYSTEM FOR SHARING USER DATA WITH INTERNET CONTENT PROVIDERS
A method includes receiving a request from an internet content provider to provide data about a subscriber associated with an IP address, where the data allows the internet content provider to maintain stateful and persistent information about an HTTP session with a user endpoint device associated with the IP address determining whether the Internet content provider is a trusted Internet content provider pre-authorized to receive at least some of the data about the subscriber, determining a subset of the data about the subscriber that is allowed to be shared with the Internet content provider, when the Internet content provider is determined to be a trusted Internet content provider, providing the subset of the data to the Internet content provider, when the subset of the data is determined, and denying the request to provide the data, when the Internet content provider is determined not to be a trusted Internet content provider.
Communication device, communication system, and recording medium
A communication device is installed in between a client terminal and a web server which performs communication with the client terminal. The communication device includes a memory, and processing circuitry coupled to the memory and configured to of information included in communication between the web server and the client terminal, perform obfuscation with respect to information related to web application, and send communication, which includes information obfuscated at the performing, to destination.
Systems and methods for dynamically restricting the rendering of unauthorized content included in information resources
Systems and methods for dynamically restricting rendering of unauthorized content included in information resources are provided herein. A computing device can identify an information resource including a content object specifying one or more graphical characteristics. The computing device can determine that the content object corresponds to a restricted content object by applying at least one of an action-based detection policy to detect actions performed on the information resource or a visual-based detection policy to detect the graphical characteristics of the content object. The computing device can modify by applying a content rendering restriction policy the information resource to alter rendering of the content element on the information resource responsive to the determination.