System and user interface supporting URL processing and concurrent application operation
First Claim
1. A system employed by an application for encoding URL link data for use in detecting unauthorized URL modification, comprising:
- a link processor for processing URL data by identifying an address portion of said URL, encrypting said address portion of said URL, incorporating said encrypted address portion of said URL together with the non-encrypted portion of said URL into a single processed URL data string; and
a communication processor for incorporating said processed URL data string into formatted data for communication to a request device.
3 Assignments
0 Petitions
Accused Products
Abstract
A URL processing system and associated communication protocol enables network compatible applications to be securely integrated into any process involving concurrent operation of applications. A system employed by an application for encoding URL link data for use in detecting unauthorized URL modification includes a link processor for processing URL data. The link processor adaptively identifies and encrypts an address portion of a URL and incorporates the encrypted address portion of the URL together with the non-encrypted portion of the URL into a single processed URL data string. The system also includes a communication processor for incorporating the processed URL data string into formatted data for communication to a request device. The link processor compresses the identified URL address portion (e.g., with a hash function) prior to encryption. A system for decoding encoded URLs applies a hash function to a corresponding URL derived from a source different to the source of the received URL to provide a second hash value for comparison with a first received hash value for URL validation.
-
Citations
22 Claims
-
1. A system employed by an application for encoding URL link data for use in detecting unauthorized URL modification, comprising:
-
a link processor for processing URL data by identifying an address portion of said URL, encrypting said address portion of said URL, incorporating said encrypted address portion of said URL together with the non-encrypted portion of said URL into a single processed URL data string; and
a communication processor for incorporating said processed URL data string into formatted data for communication to a request device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 16, 17, 18, 19)
-
-
13. A system employed by an application for encoding URL link data for use in detecting unauthorized URL modification, comprising:
-
a link processor for processing URL data by identifying an address portion of said URL, compressing said identified address portion, encrypting said compressed address portion of said URL, incorporating said encrypted address portion of said URL together with the non-encrypted portion of said URL into a single processed URL data string; and
a communication processor for incorporating said processed URL data string into formatted data for communication to a request device.
-
-
15. A system employed by an application for decoding URL link data encoded for use in detecting unauthorized URL modification, comprising:
-
an input processor for receiving an encoded URL;
a link processor for processing URL data by identifying an encrypted address portion of said received encoded URL, decrypting said encrypted address portion of said URL to provide a decrypted URL address portion, a validation processor for determining if said decrypted URL address portion has been subject to unauthorized modification.
-
-
20. A method employed by an application for encoding URL link data for use in detecting unauthorized URL modification, comprising the steps of:
-
identifying an address portion of a URL;
encrypting said address portion of said URL;
incorporating said encrypted address portion of said URL together with the non-encrypted portion of said URL into a single processed URL data string; and
incorporating said processed URL data string into formatted data for communication to a request device.
-
-
21. A method employed by an application for decoding URL link data encoded for use in detecting unauthorized URL modification, comprising the steps of:
-
receiving an encoded URL;
identifying an encrypted address portion of said received encoded URL;
decrypting said encrypted address portion of said URL to provide a decrypted URL address portion; and
determining if said decrypted URL address portion has been subject to unauthorized modification. - View Dependent Claims (22)
-
Specification