Screening for illegitimate requests to a computer application
First Claim
Patent Images
1. A method of screening for illegitimate requests to a computer application, comprising:
- screening a request with a rule having at least one of an existential condition;
a statistical condition; and
a complex universal condition.
2 Assignments
0 Petitions
Accused Products
Abstract
Illegitimate request to a computer application may be screened with a rule having at least one of an existential condition; a statistical condition; and a complex universal condition. Illegitimate Hypertext Transfer Protocol (HTTP) requests to a computer application may be screened with a rule applied to an element of the request, such as the Headers.
34 Citations
30 Claims
-
1. A method of screening for illegitimate requests to a computer application, comprising:
screening a request with a rule having at least one of an existential condition;
a statistical condition; and
a complex universal condition.- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
14. A method of screening for illegitimate requests to a computer application, comprising:
screening a request with a rule having an existential condition.
-
15. A method of screening for illegitimate Hypertext Transfer Protocol (TP) requests to a computer application, comprising:
screening an HTTP request with a rule, said rule comprising a condition for at least one of the following parts of a request;
Headers;
Cookies;
HTTP version indicators;
Universal Resource Identifier (URI) parameters;
URI-encoded fields;
multi-part encoded fields;
Simple Object Access Protocol (SOAP) elements;
URI format.- View Dependent Claims (16, 17, 18, 19)
-
20. A method of screening for illegitimate Hypertext Transfer Protocol (HTTP) requests to a computer application, comprising:
screening an HTTP request with a rule, said rule comprising a condition for fields or elements in a body of said request and a separate condition for Cookies of said request. - View Dependent Claims (21, 22, 23, 24, 25)
-
26. A computer readable medium containing computer executable instructions which when loaded into a processor cause said processor to:
screen a request with a rule having one of an existential condition;
a statistical condition; and
a complex universal condition.
-
27. A computer readable medium containing computer executable instructions which when loaded into a processor cause said processor to:
screen an HTTP request with a rule, said rule comprising a condition for at least one of the following parts of a request;
Headers;
Cookies;
HTTP version indicators;
Universal Resource Identifier (URI) parameters;
URI-encoded fields;
multi-part encoded fields;
Simple Object Access Protocol (SOAP) elements;
URI format.
-
28. A screener comprising:
-
an input for receiving requests; and
means for screening a received request with a rule having one of an existential condition;
a statistical condition; and
a complex universal condition.
-
-
29. A screener comprising:
-
an input for receiving HTTP requests; and
means for screening an HTTP request with a rule, said rule comprising a condition for at least one of the following parts of a request;
Headers;
Cookies;
HTTP version indicators;
Universal Resource Identifier (URI) parameters;
URI-encoded fields;
multi-part encoded fields;
Simple Object Access Protocol (SOAP) elements;
URI format.
-
-
30. A method of screening for illegitimate Hypertext Transfer Protocol (HTTP) requests to a computer application, comprising:
screening an HTTP request with a rule, said rule comprising a condition for at least two of the following parts of a request;
Headers;
Cookies;
Methods;
HTTP versions;
Universal Resource Identifier (URI) parameters;
URI-encoded fields;
multi-part encoded fields;
Simple Object Access Protocol (SOAP) elements;
URI format.
Specification