Securing web page content
First Claim
Patent Images
1. A system comprising:
- a memory; and
one or more physical processors coupled to the memory and configured to;
receiving a source code that is requested by a client device;
processing the source code to identify one or more security vulnerabilities including identification of an unsecure channel corresponding to a resource identified by the source code;
wherein processing the source code includes identifying a first reference in the source code to the resource to retrieve the resource via the unsecure channel;
determine whether one or more modifications to the source code would result in the resource being undeliverable to the client device;
modifying, responsive to processing the source code, the source code thereby generating a modified code, to access the resource via a secure channel;
wherein modifying the source code includes removing the first reference to the resource, adding a second reference to the resource specifying a security directive requiring use of the secure channel by a browser on the client device, and causing the resource to be hosted on a secure server or domain;
transmitting the modified code to the client device.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.
-
Citations
16 Claims
-
1. A system comprising:
-
a memory; and one or more physical processors coupled to the memory and configured to; receiving a source code that is requested by a client device; processing the source code to identify one or more security vulnerabilities including identification of an unsecure channel corresponding to a resource identified by the source code; wherein processing the source code includes identifying a first reference in the source code to the resource to retrieve the resource via the unsecure channel; determine whether one or more modifications to the source code would result in the resource being undeliverable to the client device; modifying, responsive to processing the source code, the source code thereby generating a modified code, to access the resource via a secure channel; wherein modifying the source code includes removing the first reference to the resource, adding a second reference to the resource specifying a security directive requiring use of the secure channel by a browser on the client device, and causing the resource to be hosted on a secure server or domain; transmitting the modified code to the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving a source code that is requested by a client device; processing the source code to identify one or more security vulnerabilities including identification of an unsecure channel corresponding to a resource identified by the source code; wherein processing the source code includes identifying a first reference in the source code to the resource to retrieve the resource via the unsecure channel; modifying, responsive to processing the source code, the source code thereby generating a modified code, to access the resource via a secure channel; determining whether one or more modifications to the source code would result in the resource being undeliverable to the client device; wherein modifying the source code includes removing the first reference to the resource, adding a second reference to the resource specifying a security directive requiring use of the secure channel by a browser on the client device, and causing the resource to be hosted on a secure server or domain; executing the modified code on the client device; wherein the method is performed by one or more physical processors. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification