Non-invasive contextual and rule driven injection proxy
First Claim
Patent Images
1. A method comprising:
- storing, by one or more computer systems hosting a reverse proxy, in a database, an injection rule for a web application, wherein the injection rule identifies injection code and an injection location to insert the injection code in web application code of the web application, wherein the injection rule and the injection code are not generated by processing the web application code;
receiving, at the one or more computer systems hosting a reverse proxy, a request for the web application identified by a uniform resource locator;
in response to receiving the request for the web application, querying, by the one or more computer systems hosting the reverse proxy, the database to obtain the injection rule;
receiving, by the one or more computer systems hosting the reverse proxy, the web application code from an application server in communication with the reverse proxy using the uniform resource locator;
receiving, at the one or more computer systems hosting the reverse proxy, the injection code; and
generating, with one or more processors associated with the one or more computer systems hosting the reverse proxy, a response to the request for the web application by creating response web application code by combining the web application code with the injection code injected into the web application code at the location specified by the injection rule.
2 Assignments
0 Petitions
Accused Products
Abstract
User requests for a web application can be received at a reverse proxy. Web application code for a first application can be obtained. Data can be checked at the reverse proxy to determine whether to insert an element into the first application. If there is a match, a combined web application can be produced, including the first web application and the element.
16 Citations
20 Claims
-
1. A method comprising:
-
storing, by one or more computer systems hosting a reverse proxy, in a database, an injection rule for a web application, wherein the injection rule identifies injection code and an injection location to insert the injection code in web application code of the web application, wherein the injection rule and the injection code are not generated by processing the web application code; receiving, at the one or more computer systems hosting a reverse proxy, a request for the web application identified by a uniform resource locator; in response to receiving the request for the web application, querying, by the one or more computer systems hosting the reverse proxy, the database to obtain the injection rule; receiving, by the one or more computer systems hosting the reverse proxy, the web application code from an application server in communication with the reverse proxy using the uniform resource locator; receiving, at the one or more computer systems hosting the reverse proxy, the injection code; and generating, with one or more processors associated with the one or more computer systems hosting the reverse proxy, a response to the request for the web application by creating response web application code by combining the web application code with the injection code injected into the web application code at the location specified by the injection rule. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A reverse proxy system comprising:
-
a processor; and a memory in communication with the processor, the memory storing a set of instructions, which when executed by the processor cause the processor to; store an injection rule for a web application in a database, wherein the injection rule identifies injection code and an injection location to insert the injection code in web application code of the web application, wherein the injection rule and the injection code are not generated by processing the web application code; receive a request for the web application identified by a uniform resource locator; in response to receiving the request for the web application, querying the database to obtain the injection rule; receive the web application code from an application server in communication with the reverse proxy system using the uniform resource locator; receive the injection code; and generate a response to the request for the web application by creating response web application code by combining the web application code with the injection code injected into the web application code at the location specified by the injection rule. - View Dependent Claims (9, 10, 11)
-
-
12. A system comprising:
-
a processor; and a memory in communication with the processor, the memory a set of instructions, which when executed by the processor cause the processor to; store an injection rule for a web application in a database, wherein the injection rule identifies injection code and an injection location to insert the injection code in web application code of the web application, wherein the injection rule and the injection code are not generated by processing the web application code; receive a request for the web application identified by a uniform resource locator; in response to receiving the request for the web application, querying the database to obtain the injection rule; receive the web application code from an application server in communication with a reverse proxy using the uniform resource locator; receive the injection rule code; and generate a response to the request for the web application by creating response web application code by combining the web application code with the injection code injected into the web application code at the location specified by the injection rule; wherein a DOM-TREE is used to determine where to insert the infection code. - View Dependent Claims (13, 14, 15)
-
-
16. A non-transitory machine-readable medium for a reverse proxy computer system, the non-transitory machine-readable medium having stored thereon a series of instructions executable by a processor, the series of instructions comprising:
-
instructions that cause the processor to store an injection rule for a web application in a database, wherein the injection rule identifies injection code and an injection location to insert the injection code in web application code of the web application, wherein the injection rule and the injection code are not generated by processing the web application code; instructions that cause the processor to receive a request for the web application identified by a uniform resource locator; instructions that cause the processor to, in response to receiving the request for the web application, query the database to obtain the injection rule; instructions that cause the processor to receive the web application code from an application server in communication with the reverse proxy computer system using the uniform resource locator; instructions that cause the processor to receive the injection code; and instructions that cause the processor to generate a response to the request for the web application by creating response web application code by combining the web application code with the injection code injected into the web application code at the location specified by the injection rule; wherein a DOM-TREE is used to determine where to insert the injection code. - View Dependent Claims (17, 18, 19)
-
-
20. A non-transitory machine-readable medium for a reverse proxy computer system, the non-transitory machine-readable medium having stored thereon a series of instructions executable by a processor, the series of instructions comprising:
-
instructions that cause the processor to store an injection rule for a web application in a database, wherein the injection rule identifies injection code and an injection location to insert the injection code in web application code of the web application, wherein the injection rule and the injection code are not generated by processing the web application code; instructions that cause the processor to receive a request for the web application identified by a uniform resource locator; instructions that cause the processor to, in response to receiving the request for the web application, query the database to obtain the injection rule; instructions that cause the processor to receive the web application code from an application server in communication with the reverse proxy computer system using the uniform resource locator; instructions that cause the processor to receive the injection code; and instructions that cause the processor to generate a response to the request for the web application by creating response web application code by combining the web application code with the injection code injected into the web application code at the location specified by the injection rule.
-
Specification