DISTRIBUTED CLIENT PROTECTION
First Claim
1. A computer-implementable method for managing network communication, comprising:
- responsive to receipt of traffic from a server to a client;
parsing content of the traffic; and
injecting additional content into original content of the server response to override an action of the original content, such that when the client executes the content of the traffic the client;
determines whether the content includes additional content that overrides the action of the original content; and
in response to determining that the content includes additional content that overrides the action of the original content, communicates parameters associated with execution of the action to an inspection service to determine if the action is malicious.
10 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and computer-usable medium are disclosed for, responsive to receipt of traffic from a server to a client, parsing content of the traffic, and injecting additional content into original content of the server response to override an action of the original content, such that when the client executes the content of the traffic the client determines whether the content includes additional content that overrides the action of the original content, and in response to determining that the content includes additional content that overrides the action of the original content, communicates parameters associated with execution of the action to an inspection service to determine if the action is malicious.
8 Citations
21 Claims
-
1. A computer-implementable method for managing network communication, comprising:
responsive to receipt of traffic from a server to a client; parsing content of the traffic; and injecting additional content into original content of the server response to override an action of the original content, such that when the client executes the content of the traffic the client; determines whether the content includes additional content that overrides the action of the original content; and in response to determining that the content includes additional content that overrides the action of the original content, communicates parameters associated with execution of the action to an inspection service to determine if the action is malicious. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A system comprising:
-
a processor; a data bus coupled to the processor; and a non-transitory, computer-readable storage medium embodying computer program code, the non-transitory, computer-readable storage medium being coupled to the data bus, the computer program code interacting with a plurality of computer operations and comprising instructions executable by the processor and configured for; responsive to receipt of traffic from a server to a client; parsing content of the traffic; and injecting additional content into original content of the server response to override an action of the original content, such that when the client executes the content of the traffic the client; determines whether the content includes additional content that overrides the action of the original content; and in response to determining that the content includes additional content that overrides the action of the original content, communicates parameters associated with execution of the action to an inspection service to determine if the action is malicious. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory, computer-readable storage medium embodying computer program code, the computer program code comprising computer executable instructions configured for:
responsive to receipt of traffic from a server to a client; parsing content of the traffic; and injecting additional content into original content of the server response to override an action of the original content, such that when the client executes the content of the traffic the client; determines whether the content includes additional content that overrides the action of the original content; and in response to determining that the content includes additional content that overrides the action of the original content, communicates parameters associated with execution of the action to an inspection service to determine if the action is malicious. - View Dependent Claims (16, 17, 18, 19, 20, 21)
Specification