Secure component-based web applications
First Claim
1. A system comprising:
- a processor; and
a memory storing instructions configurable to cause;
obtaining a plurality of documents for a web-based application, the web-based application comprising one or more of a plurality of custom components and one or more application programming interface (API) components;
processing a document object model (DOM) corresponding to the web-based application, wherein the one or more custom components and the one or more API components are modeled in hierarchical form; and
for each custom component;
assigning a key to the custom component, the key constituting an object reference of the custom component such that the custom component is accessible only to other components capable of providing the key in accordance with one or more rules of capability security,identifying one or more accessible custom components for which the custom component is capable of providing a key assigned to the one or more accessible custom components,generating a virtual DOM for the custom component corresponding to the web-based application, wherein the custom component and the identified one or more accessible custom components are modeled in hierarchical form, andrestricting access of the custom component to all inaccessible custom components for which the custom component is not capable of providing a key assigned to an inaccessible custom component.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are examples of systems, apparatus, methods and computer program products for providing a security model for component-based web applications. Documents for a web-based application are received, with the application containing custom components and Application Programming Interface (API) components. A Document Object Model (DOM) is processed corresponding to the web-based application, with the custom and API components modeled in hierarchical form. For each custom component, a key is assigned in accordance with the rules of capability security, accessible custom components are identified for which the custom component can provide the assigned key, a virtual DOM is generated for the custom component with the component and identified accessible custom components being modeled in hierarchical form, and the custom component is prohibited access to all inaccessible custom components.
217 Citations
20 Claims
-
1. A system comprising:
-
a processor; and a memory storing instructions configurable to cause; obtaining a plurality of documents for a web-based application, the web-based application comprising one or more of a plurality of custom components and one or more application programming interface (API) components; processing a document object model (DOM) corresponding to the web-based application, wherein the one or more custom components and the one or more API components are modeled in hierarchical form; and for each custom component; assigning a key to the custom component, the key constituting an object reference of the custom component such that the custom component is accessible only to other components capable of providing the key in accordance with one or more rules of capability security, identifying one or more accessible custom components for which the custom component is capable of providing a key assigned to the one or more accessible custom components, generating a virtual DOM for the custom component corresponding to the web-based application, wherein the custom component and the identified one or more accessible custom components are modeled in hierarchical form, and restricting access of the custom component to all inaccessible custom components for which the custom component is not capable of providing a key assigned to an inaccessible custom component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving a plurality of documents for a web-based application, the web-based application comprising one or more of a plurality of custom components and one or more application programming interface (API) components; processing a document object model (DOM) corresponding to the web-based application, wherein the one or more custom components and the one or more API components are modeled in hierarchical form; and for each custom component; assigning a key to the custom component, the key constituting an object reference of the custom component such that the custom component is accessible only to other components capable of providing the key in accordance with one or more rules of capability security, identifying one or more accessible custom components for which the custom component is capable of providing a key assigned to the one or more accessible custom components, generating a virtual DOM for the custom component corresponding to the web-based application, wherein the custom component and the identified one or more accessible custom components are modeled in hierarchical form, and restricting access of the custom component to all inaccessible custom components for which the custom component is not capable of providing a key assigned to an inaccessible custom component. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer program product comprising a non-transitory computer-readable medium storing computer-readable program code capable of being executed by one or more processors, the program code comprising instructions configurable to cause:
-
obtaining a plurality of documents for a web-based application, the web-based application comprising one or more of a plurality of custom components and one or more application programming interface (API) components; processing a document object model (DOM) corresponding to the web-based application, wherein the one or more custom components and the one or more API components are modeled in hierarchical form; and for each custom component; assigning a key to the custom component, the key constituting an object reference of the custom component such that the custom component is accessible only to other components capable of providing the key in accordance with one or more rules of capability security, identifying one or more accessible custom components for which the custom component is capable of providing a key assigned to the one or more accessible custom components, generating a virtual DOM for the custom component corresponding to the web-based application, wherein the custom component and the identified one or more accessible custom components are modeled in hierarchical form, and restricting access of the custom component to all inaccessible custom components for which the custom component is not capable of providing a key assigned to an inaccessible custom component. - View Dependent Claims (18, 19, 20)
-
Specification