1
Justin D Call, Subramanian Varadarajan, Xiaochan Huang, Xiaoming Zhou, Marc R Hansen: Detecting the introduction of alien content. J Johnson, March 28, 2017: US09609006 (12 worldwide citation)

A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characteriz ...


2
Justin D Call, Subramanian Varadarajan, Xiaohan Huang, Xiaoming Zhou, Marc R Hansen: Detecting the introduction of alien content. Shape Security, Fish & Richardson P C, December 29, 2015: US09225737 (12 worldwide citation)

A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characteriz ...


3
Marc R Hansen, Sumit Agarwal, Subramanian Varadarajan, Justin D Call: Stateless web content anti-automation. Shape Security, Fish & Richardson P C, May 10, 2016: US09338143 (8 worldwide citation)

A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet; modifying the computer code to obscure operation of th ...


4
Justin D Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R Hansen: Protecting against the introduction of alien content. Shape Security, Fish & Richardson P C, October 21, 2014: US08869281 (5 worldwide citation)

In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify ...


5
Justin D Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R Hansen: Protecting against the introduction of alien content. Shape Security, Fish & Richardson P C, November 3, 2015: US09178908 (3 worldwide citation)

In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify ...


6
Justin D Call, Marc R Hansen, Xinran Wang, Sumit Agarwal, Bryan D Hanks: Dynamic field re-rendering. Shape Security, Fish & Richardson P C, May 5, 2015: US09027142 (3 worldwide citation)

A computer-implemented method involves identifying an initial element for serving by a web server system to a client device and recoding the element by creating a plurality of different elements that each represent a portion of the initial element. The different elements are then served in place of ...


7
Shishir Krovvidi Ramam, Shuman Ghosemajumder, Marc R Hansen: Content modification in served code. Shape Security, Fish & Richardson P C, October 25, 2016: US09477836 (2 worldwide citation)

In some implementations, a computer system for obfuscating text in an electronic document can include an analysis module, a font data repository, a re-coding module, and a data interface. The analysis module is operable to identify strings of text from an electronic document. The font data repositor ...


8
Justin D Call, Subramanian Varadarajan, Xiaochan Huang, Xiaoming Zhou, Marc R Hansen: Protecting a server computer by detecting the identity of a browser on a client computer. May 15, 2018: US09973519

A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characteriz ...


9
Roger S Hoover, Marc R Hansen, Justin D Call: Background analysis of web content. Shape Security, November 21, 2017: US09825984

A computer-implemented method includes receiving, at a primary security sub-system, code to be served from a web server system to one or more computing devices; forwarding a representation of the code to a secondary security sub-system that is remote from the primary security sub-system; receiving, ...


10
Justin D Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R Hansen: Protecting against the introduction of alien content. Shape Security, October 17, 2017: US09794276

In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify ...