METHOD AND APPARATUS FOR SECURITY VALIDATION
First Claim
1. A computer-implemented method for security validation of a user input in a computer network application, the method comprising the steps of:
- providing a subset of security rules of a server-side protection means to a pre-validation component deployed at a client side, so as to enable security validation of a user input on the client side by the pre-validation component based on the provided security rule subset;
validating the user input based on at least one of the security rules of the server-side protection means;
determining, in response to detecting a user input violation and that a violated security rule has not been provided to the pre-validation component, the user as one of a first class of users;
determining, in response to detecting a the user input violation and that the violated security rule has been provided to the pre-validation component, the user as one of a second class of users; and
performing different security protection actions to the determined first class of users and the determined second class of users, wherein the step of performing different security protection actions to the determined first class of users and the determined second class of users comprises;
performing, to the second class of users, a security protection action as compulsorily blocking all subsequent requests, andperforming, to the first class of users, a security protection action which maintains access to the computer network application.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method, apparatus, and article of manufacture for security validation of a user input in a computer network application. The method includes: providing a subset of security rules of a server-side protection means to a pre-validation component deployed at a client side, so as to enable security validation of a user input on the client side by the pre-validation component; validating the user input based on at least one of the security rules; determining, in response to detecting a user input violation and that a violated security rule has not been provided to the pre-validation component, the user as a first class of users; determining, in response to detecting the user input violation and that the violated security rule has been provided to the pre-validation component, the user as a second class of users; and performing different security protection actions to the first and second class of users.
39 Citations
12 Claims
-
1. A computer-implemented method for security validation of a user input in a computer network application, the method comprising the steps of:
-
providing a subset of security rules of a server-side protection means to a pre-validation component deployed at a client side, so as to enable security validation of a user input on the client side by the pre-validation component based on the provided security rule subset; validating the user input based on at least one of the security rules of the server-side protection means; determining, in response to detecting a user input violation and that a violated security rule has not been provided to the pre-validation component, the user as one of a first class of users; determining, in response to detecting a the user input violation and that the violated security rule has been provided to the pre-validation component, the user as one of a second class of users; and performing different security protection actions to the determined first class of users and the determined second class of users, wherein the step of performing different security protection actions to the determined first class of users and the determined second class of users comprises; performing, to the second class of users, a security protection action as compulsorily blocking all subsequent requests, and performing, to the first class of users, a security protection action which maintains access to the computer network application. - View Dependent Claims (2, 3, 4)
-
-
5. An apparatus for security validation of a user input in a computer network application, the apparatus comprising:
-
means for providing a subset of security rules of a server-side protection means to a pre-validation component deployed at a client side, so as to enable security validation of a user input on the client side by the pre-validation component based on the provided security rule subset; means for validating the user input based on at least one of the security rules of the server-side protection means; means for determining, in response to detecting a violation user input violation and that a violated security rule has not been provided to the pre-validation component, the user as one of a first class of users; means for determining, in response to detecting the user input violation and that a the violated security rule has been provided to the pre-validation component, the user as one of a second class of users; and means for performing different security protection actions to the determined first class of users and the determined second class of users, wherein the means for performing different security protection actions to the determined first class of users and the determined second class of users comprises; means for performing, to the second class of users, a security protection action as compulsorily blocking all subsequent requests, and means for performing, to the first class of users, a security protection action, which maintains access to the computer network application. - View Dependent Claims (6, 7, 8)
-
-
9. An article of manufacture tangibly embodying computer readable non-transitory instructions which, when implemented, cause a computer to carry out the steps of the method of security validation of a user input in a network application, the method comprising:
-
providing a subset of security rules of a server-side protection means to pre-validation component deployed at a client side, so as to enable security validation of a user input on the client side by the pre-validation component based on the provided security rule subset; validating the user input based on at least one of the security rules of the server-side protection means; determining, in response to detecting a user input violation and that a violated security rule has not been provided to the pre-validation component, the user as one of a first class of users; determining, in response to detecting the user input violation and that the violated security rule has been provided to the pre-validation component, the user as one of a second class of users; and performing different security protection actions to the determined first class of users and the determined second class of users, wherein the step of performing different security protection actions to the determined first class of users and the determined second class of users comprises; performing, to the second class of users, a security protection action as compulsorily blocking all subsequent requests, and performing, to the first class of users, a security protection action which maintains access to the computer network application. - View Dependent Claims (10, 11, 12)
-
Specification