System and user interface for adaptively processing and communicating URL data between applications
First Claim
1. A system employed by a first application for encoding URL link data for use in detecting unauthorized URL modification, comprising:
- an input processor for receiving an encryption key;
a URL processor for processing a URL link to a second application using said received encryption key by identifying URL type and adaptively encrypting a URL link address portion based on said identified type to produce a processed URL; and
a communication processor for including said processed URL in data representing a web page and for communicating said web page representative data including said processed URL to a requesting application.
3 Assignments
0 Petitions
Accused Products
Abstract
A system processes and communicates URL data to enable network (including Internet) compatible applications to be securely integrated into any process involving concurrent operation of applications. A first application employs a system for encoding URL link data for use in detecting unauthorized URL modification. The system includes an input processor for receiving an encryption key and a URL processor for processing a URL link to a second application using the received encryption key. The URL processor identifies URL type and adaptively encrypts a URL link address portion based on the identified type to produce a processed URL. A communication processor includes the processed URL in data representing a web page and communicates the web page representative data including the processed URL to a requesting application. A managing application provides a common encryption key to a plurality of concurrently operating applications for use by the URL processor and the URL processor also adaptively generates URL fields including an encrypted URL address portion and a non-encrypted session identifier.
65 Citations
24 Claims
-
1. A system employed by a first application for encoding URL link data for use in detecting unauthorized URL modification, comprising:
-
an input processor for receiving an encryption key;
a URL processor for processing a URL link to a second application using said received encryption key by identifying URL type and adaptively encrypting a URL link address portion based on said identified type to produce a processed URL; and
a communication processor for including said processed URL in data representing a web page and for communicating said web page representative data including said processed URL to a requesting application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for encoding URL link data for use in detecting unauthorized URL modification occurring during concurrent operation of a plurality of applications, comprising:
-
a managing application for providing a common encryption key to a plurality of concurrently operating applications; and
a first application including, an input processor for receiving said encryption key;
a URL processor for processing a URL link to a second application using said received encryption key by identifying URL type and adaptively encrypting a URL link address portion based on said identified type to produce a processed URL; and
a communication processor for including said processed URL in data representing a web page and for communicating said web page representative data including said processed URL to a requesting application. - View Dependent Claims (12, 13, 14, 15, 17, 19)
-
-
16. A system for encoding URL link data for use in detecting unauthorized URL modification, comprising:
-
a browser application for providing a user interface display permitting user entry of identification information for providing user identification information to a first application;
a first application responsive to said user identification information including, a URL processor for adaptively generating URL fields including an encrypted URL address portion for incorporation together with a non-encrypted portion in a processed URL; and
a communication processor for including said processed URL in data representing a web page and for communicating said web page representative data including said processed URL to a requesting application.
-
-
18. A system for processing URL link data for detecting unauthorized URL modification and suitable for use by a plurality of concurrently operating applications, comprising:
a first application including, a URL processor for adaptively generating a URL link to a second application differently to a URL link to a web page provided by said first application, to provide a generated URL; and
a communication processor for including said generated URL in data representing a web page and for communicating said web page representative data including said generated URL to a requesting application.
-
20. A system supporting concurrent operation of a plurality of Internet compatible applications, comprising:
a browser application including, a display generator for providing a user interface display permitting user entry of identification information and commands for a plurality of Internet compatible applications and for providing user identification information to a first application;
a URL generator for adaptively generating a URL including URL fields incorporating an encrypted URL address portion and a non-encrypted session identifier; and
a processor for initiating communication of said generated URL to said first application in response to validation of said user identification information.
-
21. A method employed by a first application for encoding URL link data for use in detecting unauthorized URL modification in a system supporting concurrent operation of a plurality of applications, comprising the steps of:
-
receiving an encryption key;
processing a URL link to a second application using said received encryption key by identifying URL type and adaptively encrypting a URL link address portion based on said identified type to produce a processed URL; and
including said processed URL in data representing a web page and for communicating said web page representative data including said processed URL to a requesting application.
-
-
22. A method employed by a first application operating in a system supporting concurrent operation of a plurality of Internet compatible applications, said method comprising the steps of:
-
in response to a command from a request device to initiate a first application, enabling user operability of said first application based upon validation of user identification information;
encrypting a link to a second application;
including said encrypted link in data representing a web page to be returned to said request device; and
communicating to said request device, said web page representative data including said encrypted link.
-
-
23. A method for encoding URL link data for use in detecting unauthorized URL modification in a system supporting concurrent operation of a plurality of applications, comprising the steps of:
-
providing a common encryption key to said plurality of concurrently operating applications; and
receiving said encryption key;
processing a URL link to a second application using said received encryption key by identifying URL type and adaptively encrypting a URL link address portion based on said identified type to produce a processed URL; and
including said processed URL in data representing a web page and for communicating said web page representative data including said processed URL to a requesting application.
-
-
24. A method for processing URL link data for use in detecting unauthorized URL modification in a system supporting concurrent operation of a plurality of applications, comprising the steps of:
-
adaptively generating a URL link to a second application differently to a URL link to a web page provided by said first application, to provide a generated URL; and
including said generated URL in data representing a web page and for communicating said web page representative data including said generated URL to a requesting application.
-
Specification