Cloud suffix proxy and a method thereof
First Claim
Patent Images
1. A method for securing a cloud application, comprising:
- receiving a webpage sent to a client device from at least one cloud application;
injecting a piece of code into the webpage, wherein the piece of code maintains an encryption key in a document object model (DOM) of the webpage, wherein the piece of code allows encryption of any text field in the webpage when executed by the client device;
intercepting at least one encrypted text field inserted into the DOM; and
modifying the DOM by decrypting each of the intercepted at least one encrypted text field and inserting each decrypted text field into the DOM.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for securing a cloud application are provided. The method includes receiving a webpage sent to a client device from at least one cloud application; injecting a piece of code into the webpage, wherein the piece of code maintains an encryption key in a document object model (DOM) of the webpage, wherein the piece of code allows encryption of any text field in the webpage when executed by the client device; intercepting at least one encrypted text field inserted into the DOM; and modifying the DOM by decrypting each of the intercepted at least one encrypted text field and inserting each decrypted text field into the DOM.
-
Citations
19 Claims
-
1. A method for securing a cloud application, comprising:
-
receiving a webpage sent to a client device from at least one cloud application; injecting a piece of code into the webpage, wherein the piece of code maintains an encryption key in a document object model (DOM) of the webpage, wherein the piece of code allows encryption of any text field in the webpage when executed by the client device; intercepting at least one encrypted text field inserted into the DOM; and modifying the DOM by decrypting each of the intercepted at least one encrypted text field and inserting each decrypted text field into the DOM. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer readable medium having stored thereon instructions for causing at least one processor to execute a process for securing a cloud application, the process comprising:
-
receiving a webpage sent to a client device from the at least one cloud application; injecting a piece of code to the webpage, wherein the piece of code maintains an encryption key in a document object model (DOM) of the webpage, wherein the piece of code when executed by the client device allows encryption of any text field in the webpage; intercepting any encrypted text field inserted into the DOM; and modifying the DOM by decrypting each intercepted encrypted text field and inserting each decrypted text field into the DOM.
-
-
11. A system for process for securing a cloud application, comprising:
-
a processor; and a memory containing instructions that, when executed by the processor, configure the system to; receive a webpage sent to a client device from the at least one cloud application; inject a piece of code to the webpage, wherein the piece of code maintains an encryption key in a document object model (DOM) of the webpage, wherein the piece of code when executed by the client device allows encryption of any text field in the webpage; intercept any encrypted text field inserted into the DOM; and modify the DOM by decrypting each intercepted encrypted text field and inserting each decrypted text field into the DOM. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification