1
Justin D Call, Xinran Wang, Yao Zhao, Timothy Dylan Peacock: Detection of client-side malware activity. Shape Security, Fish & Richardson P C, March 31, 2015: US08997226 (14 worldwide citation)

A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided by the third-party to client computing devices; receiving data from client computing devices that have been served the code by the third-party ...


2
Justin D Call, Subramanian Varadarajan, Xiaochan Huang, Xiaoming Zhou, Marc R Hansen: Detecting the introduction of alien content. J Johnson, March 28, 2017: US09609006 (13 worldwide citation)

A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characteriz ...


3
Justin D Call, Subramanian Varadarajan, Xiaohan Huang, Xiaoming Zhou, Marc R Hansen: Detecting the introduction of alien content. Shape Security, Fish & Richardson P C, December 29, 2015: US09225737 (13 worldwide citation)

A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characteriz ...


4
Marc R Hansen, Sumit Agarwal, Subramanian Varadarajan, Justin D Call: Stateless web content anti-automation. Shape Security, Fish & Richardson P C, May 10, 2016: US09338143 (9 worldwide citation)

A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet; modifying the computer code to obscure operation of th ...


5
Justin D Call, Xinran Wang, Yao Zhao, Timothy Dylan Peacock: Detection of client-side malware activity. Shape Security, Hickman Palermo Becker Bingham, July 11, 2017: US09705902 (7 worldwide citation)

A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided by the third-party to client computing devices; receiving data from client computing devices that have been served the code by the third-party ...


6
Justin D Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R Hansen: Protecting against the introduction of alien content. Shape Security, Fish & Richardson P C, October 21, 2014: US08869281 (6 worldwide citation)

In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify ...


7
Justin D Call, Marc R Hansen, Xinran Wang, Sumit Agarwal, Bryan D Hanks: Dynamic field re-rendering. Shape Security, Fish & Richardson P C, May 5, 2015: US09027142 (4 worldwide citation)

A computer-implemented method involves identifying an initial element for serving by a web server system to a client device and recoding the element by creating a plurality of different elements that each represent a portion of the initial element. The different elements are then served in place of ...


8
Justin D Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R Hansen: Protecting against the introduction of alien content. Shape Security, Fish & Richardson P C, November 3, 2015: US09178908 (3 worldwide citation)

In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify ...


9
Timothy Dylan Peacock, Justin D Call, Siying Yang, Sumit Agarwal: Distributed polymorphic transformation of served content. Shape Security, Fish & Richardson P C, April 26, 2016: US09325734 (3 worldwide citation)

A computer-implemented method includes receiving, at a computer security server system located between the Internet and a client computing device that makes requests over the Internet, a request for content directed to a particular content server system; forwarding the received request, with the com ...


10
Justin D Call: Pre-analyzing served content. Shape Security, Fish & Richardson P C, November 8, 2016: US09489526 (1 worldwide citation)

A computer-implemented method includes identifying first code for a content that has not been analyzed for purposes of transforming the first code before serving the code in response to future requests for the first code; analyzing the first code to identify portions of the first code that can be ch ...