SYSTEMS AND METHODS FOR INTERCEPTING, PROCESSING, AND PROTECTING USER DATA THROUGH WEB APPLICATION PATTERN DETECTION
First Claim
Patent Images
1. A processor implemented method on a device, the method comprising:
- receiving web application resources associated with a web application;
modifying the web application resources by adding methods at least some of which pertain to processing of user data of the web application.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods of intercepting user data of a web application are provided. After web application resources are obtained for execution on a client device, methods that process user data of the web application are added to create modified web application resources. Certain runtime application calls are intercepted. This can be achieved by modifying the actual code to replace calls to certain functions with calls to the added methods, or by using overloading. The data processing may add data security functionality.
56 Citations
28 Claims
-
1. A processor implemented method on a device, the method comprising:
-
receiving web application resources associated with a web application; modifying the web application resources by adding methods at least some of which pertain to processing of user data of the web application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 24)
-
-
19. A processor implemented method of processing data comprising:
-
i) in respect of outgoing data; a) tokenizing the data to produce tokenized data and returning the tokenized data; b) encrypting the data to produce encrypted data; c) creating a mapping between the encrypted data and the tokenized data; the security feature processes incoming data by; ii) in respect of incoming data; d) extracting tokenized data; e) demapping the tokenized data to obtain corresponding encrypted data; f) decrypting the encrypted data to produce cleartext data; g) returning cleartext data. - View Dependent Claims (20, 21, 22, 23)
-
-
25. A system comprising:
-
a processor; memory; at least one user interface; an application runtime with user data interception and processing for execution by the processor configured to receive web application resources executable on the application runtime, and modify the web application resources by adding methods at least some of which pertain to processing of user data. - View Dependent Claims (26, 27, 28)
-
Specification