×

Opaque cryptographic web application data protection

  • US 7,765,310 B2
  • Filed: 07/22/2005
  • Issued: 07/27/2010
  • Est. Priority Date: 06/23/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, in a computing system, for protecting Web application data between a server and a client comprising:

  • building, by the server, a response for the client;

    invoking, by the server, a data protection service for the response, the response comprising a first data having a first state;

    modifying, by the server, the response by replacing the first data with a protected data;

    sending, by the server, the modified response to the client;

    receiving, in the server, a request with the protected data from the client;

    passing, by the server, the received protected data to the data protection service for verification;

    restoring, by the server, the request corresponding to the first state of the response at the data protection service; and

    sending, by the server, the request to a Web application, wherein;

    the protected data comprises server state data having multiple wrappers, each wrapper having an associated data protection service recognizable prefix a portion of the server state data to which a particular protection operation, corresponding to the data protection service recognizable prefix associated with that wrapping, has been applied,the data protection service recognizable prefix identifies a type of data protection service applied to the portion of the server state data,the protected data is built up from multiple requests sent from the client to the server, with each wrapper in the multiple wrappers being added to the protected data in response to the server processing a corresponding request from the client,the particular protection operation applied to the portion of server state data, and identified by the data protection service recognizable prefix, for each wrapper is one of a confidentiality protection operation that prevents viewing of data by entities outside the server, an integrity protection operation that ensures that data has a same value as when the data is inserted into a response to a request, or an origin authentication operation that enforces that data is received from a specific user,at least two wrappers in the multiple wrappers have different data protection service recognizable prefixes, identifying different types of data protection services, and portions of server state data to which different particular protection operations have been applied.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×