System and user interface for adaptively processing and communicating URL data between applications
First Claim
1. A system employed by a first application for encoding URL link data for use in detecting unauthorized URL modification, comprising:
- an input processor for receiving an encryption key;
a URL processor for adaptively processing a URL link to a second application differently to an intra-application link to a web page provided by said first application by using said received encryption key to encrypt a URL link address portion of said URL link to said second application to produce a processed URL and by non-encryption of said intra-application link; and
a communication processor for including said processed URL in data representing a web page and for communicating said web page representative data including said processed URL to a requesting application.
3 Assignments
0 Petitions
Accused Products
Abstract
A system processes and communicates URL data to enable network (including Internet) compatible applications to be securely integrated into any process involving concurrent operation of applications. A first application employs a system for encoding URL link data for use in detecting unauthorized URL modification. The system includes an input processor for receiving an encryption key and a URL processor for processing a URL link to a second application using the received encryption key. The URL processor identifies URL type and adaptively encrypts a URL link address portion based on the identified type to produce a processed URL. A communication processor includes the processed URL in data representing a web page and communicates the web page representative data including the processed URL to a requesting application. A managing application provides a common encryption key to a plurality of concurrently operating applications for use by the URL processor and the URL processor also adaptively generates URL fields including an encrypted URL address portion and a non-encrypted session identifier.
59 Citations
24 Claims
-
1. A system employed by a first application for encoding URL link data for use in detecting unauthorized URL modification, comprising:
-
an input processor for receiving an encryption key; a URL processor for adaptively processing a URL link to a second application differently to an intra-application link to a web page provided by said first application by using said received encryption key to encrypt a URL link address portion of said URL link to said second application to produce a processed URL and by non-encryption of said intra-application link; and a communication processor for including said processed URL in data representing a web page and for communicating said web page representative data including said processed URL to a requesting application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for encoding URL link data for use in detecting unauthorized URL modification occurring during concurrent operation of a plurality of applications, comprising:
-
a managing application for providing a common encryption key to a plurality of concurrently operating applications; and a first application including, an input processor for receiving said encryption key; a URL processor for adaptively processing a URL link to a second application differently to an intra-application link to a web page provided by said first application by using said received encryption key to encrypt a URL link address portion of said URL link to said second application to produce a processed URL and by non-encryption of said intra-application link; and a communication processor for including said processed URL in data representing a web page and for communicating said web page representative data including said processed URL to a requesting application. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system for encoding URL link data for use in detecting unauthorized URL modification, comprising:
-
a browser application for providing a user interface display permitting user entry of identification information for providing user identification information to a first application; a first application responsive to said user identification information including, a URL processor for adaptively generating URL fields including an encrypted URL address portion and encrypted patient specific information for incorporation together with a non-encrypted portion in a processed URL; and a communication processor for including said processed URL in data representing a web page and for communicating said web page representative data including said processed URL to a requesting application. - View Dependent Claims (17)
-
-
18. A system for processing URL link data for detecting unauthorized URL modification and suitable for use by a plurality of concurrently operating applications, comprising:
a first application including, a URL processor for adaptively generating a URL link to a second application differently to a URL link to a web page provided by said first application, to provide a generated URL by using a received encryption key to encrypt a URL link address portion of said URL link to said second application and by non-encryption of said URL link to said web page provided by said first application; and a communication processor for including said generated URL in data representing a web page and for communicating said web page representative data including said generated URL to a requesting application. - View Dependent Claims (19)
-
20. A system supporting concurrent operation of a plurality of Internet compatible applications, comprising:
a browser application including a display generator for providing a user interface display permitting user entry of identification information and commands for a plurality of Internet compatible applications and for providing user identification information to a first application; a URL generator for adaptively generating a URL including URL fields incorporating a URL address portion which has been encrypted and a non-encrypted session identifier; and a processor for initiating communication of said generated URL to said first application in response to validation of said user identification information, said first application having access to a key for decrypting said URL address portion which has been encrypted.
-
21. A method employed by a first application for encoding URL link data for use in detecting unauthorized URL modification in a system supporting concurrent operation of a plurality of applications, comprising the steps of:
-
receiving an encryption key; processing a URL link to a second application differently to an intra-application link to a web page provided by said first application by using said received encryption key to encrypt a URL link address portion of said URL link to said second application to produce a processed URL and by non-encryption of said intra-application link; and including said processed URL in data representing a web page and communicating said web page representative data including said processed URL to a requesting application.
-
-
22. A method employed by a first application operating in a system supporting concurrent operation of a plurality of Internet compatible applications, said method comprising the steps of:
-
in response to a command from a request device to initiate a first application, enabling user operability of said first application based upon validation of user identification information; forming a URL to provide a formed URL link by encrypting a link address to a second application and incorporating said encrypted link address, session identification information and encrypted patient specific information in said formed URL link; including said formed URL link in data representing a web page to be returned to said request device; and communicating to said request device, said web page representative data including said formed URL link.
-
-
23. A method for encoding URL link data for use in detecting unauthorized URL modification in a system supporting concurrent operation of a plurality of applications, comprising the steps of:
-
providing a common encryption key to said plurality of concurrently operating applications; receiving said encryption key; adaptively processing a URL link to a second application differently to an intra-application link to a web page provided by a first application by using said received encryption key to encrypt a URL link address portion of said URL link to said second application to produce a processed URL and by non-encryption of said intra-application link; and including said processed URL in data representing a web page and communicating said web page representative data including said processed URL to a requesting application.
-
-
24. A method for processing URL link data for use in detecting unauthorized URL modification in a system supporting concurrent operation of a plurality of applications, comprising the steps of:
-
adaptively generating a URL link to a second application differently to an intra-application link to a web page provided by a first application by using a received encryption key to encrypt a URL link address portion of said URL link to said second application to produce a generated URL; providing a key to said second application for decrypting said encrypted URL address portion; and including said generated URL in data representing a web page and communicating said web page representative data including said generated URL to a requesting application.
-
Specification