ANTI-TAMPERING SYSTEM
First Claim
1. A method for preventing tampering with the accessibility of resources specified by Universal Resource Locators (URLs) comprisingreceiving a request for a resource from a client device at a proxy server, the request including a secondary URL, the secondary URL being a modified version of a primary URL;
- processing the secondary URL to identify the primary URL;
requesting the resource from a third party server using the primary URL; and
providing the resource to the client device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for preventing tampering with the accessibility of resources specified by Universal Resource Locators (URLs) comprising receiving a primary URL from a web server; creating a unique identifier and associating, in a database or by means of encryption, the unique identifier with the received primary URL; creating a secondary URL that includes the unique identifier; and providing the secondary URL to the web server wherein the primary URL is cross referenced to the secondary URL through the unique identifier.
20 Citations
22 Claims
-
1. A method for preventing tampering with the accessibility of resources specified by Universal Resource Locators (URLs) comprising
receiving a request for a resource from a client device at a proxy server, the request including a secondary URL, the secondary URL being a modified version of a primary URL; -
processing the secondary URL to identify the primary URL; requesting the resource from a third party server using the primary URL; and providing the resource to the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for preventing tampering with the accessibility of resources specified by Universal Resource Locators (URLs), the method comprising
receiving a primary URL from a web server; -
creating a unique identifier for the received primary URL to create a secondary URL, the secondary URL including the unique identifier such that the primary and secondary URLs are referenced to one another using the unique identifier; providing the secondary URL to a proxy server, the proxy server using the unique identifier to process the secondary URL to identify the primary URL; and using the proxy server to retrieve a resource identified by the primary URL and to return that resource to a client device.
-
-
20. A proxy server configured to provide an anti-tampering filter for preventing tampering with the accessibility of resources specified by Universal Resource Locators (URLs), the proxy server comprising a processor and a database and configured to:
-
receiving a request for a resource from a client device, the request including a secondary URL, the secondary URL being a modified version of a primary URL; processing the secondary URL to identify the primary URL; requesting the resource from a third party server using the primary URL; and providing the resource to the client device. - View Dependent Claims (21, 22)
-
Specification