OBSCURING DIGITAL CONTENT ITEMS
    1.
    发明申请
    OBSCURING DIGITAL CONTENT ITEMS 审中-公开
    观察数字内容项目

    公开(公告)号:US20140189499A1

    公开(公告)日:2014-07-03

    申请号:US14201705

    申请日:2014-03-07

    CPC classification number: G06F17/2247 G06F17/227 G06F21/84 G06F2221/032

    Abstract: A user device receives a content item and a script associated with the content item. The user device stores an obfuscated version of the content item and an associated style sheet in memory. The user device dynamically updates the style sheet stored in the memory using the script to remove the obfuscation from the obfuscated version of the content item when the content item is presented in a web browser running on the user device.

    Abstract translation: 用户设备接收内容项目和与内容项目相关联的脚本。 用户设备将内容项目的混淆版本和关联的样式表存储在存储器中。 当在用户设备上运行的网络浏览器中呈现内容项时,用户设备使用脚本来动态地更新存储在存储器中的样式表,以从内容项的混淆版本去除混淆。

    Post attack man-in-the-middle detection
    2.
    发明授权
    Post attack man-in-the-middle detection 有权
    后攻击中间人检测

    公开(公告)号:US08850185B1

    公开(公告)日:2014-09-30

    申请号:US13931013

    申请日:2013-06-28

    Abstract: Technologies are described herein for post attack man-in-the-middle detection. A first computer receives and stores public key certificates when connections are established. The first computer also uploads the stored public key certificates associated with a domain to a second computer each time a connection is established with the domain. The second computer receives the public key certificates from the first computer. The second computer then determines whether any of the public key certificates provided by the first computer are fraudulent certificates by comparing the received certificates to known valid certificates. If the second computer determines that the first computer has received one or more fraudulent certificates, the second computer may cause action to be taken with regard to the fraudulent certificates.

    Abstract translation: 本文描述了技术,用于后攻击中间人检测。 建立连接时,第一台计算机接收并存储公钥证书。 每当与域建立连接时,第一台计算机也将与域关联的存储的公钥证书上传到第二台计算机。 第二台计算机从第一台计算机接收公钥证书。 然后,第二计算机通过将接收到的证书与已知有效证书进行比较来确定由第一计算机提供的任何公钥证书是否是欺诈证书。 如果第二计算机确定第一台计算机已经接收到一个或多个欺诈证书,则第二台计算机可能会对欺诈性证书采取行动。

Patent Agency Ranking