1
Justin D Call, Subramanian Varadarajan, Xiaochan Huang, Xiaoming Zhou, Marc R Hansen: Detecting the introduction of alien content. J Johnson, March 28, 2017: US09609006 (12 worldwide citation)

A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characteriz ...


2
Justin D Call, Subramanian Varadarajan, Xiaohan Huang, Xiaoming Zhou, Marc R Hansen: Detecting the introduction of alien content. Shape Security, Fish & Richardson P C, December 29, 2015: US09225737 (12 worldwide citation)

A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characteriz ...


3
Marc R Hansen, Sumit Agarwal, Subramanian Varadarajan, Justin D Call: Stateless web content anti-automation. Shape Security, Fish & Richardson P C, May 10, 2016: US09338143 (8 worldwide citation)

A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet; modifying the computer code to obscure operation of th ...


4
Justin D Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R Hansen: Protecting against the introduction of alien content. Shape Security, Fish & Richardson P C, October 21, 2014: US08869281 (5 worldwide citation)

In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify ...


5
Justin Call, Subramanian Varadarajan, Bryan Hanks: Client/server authentication using dynamic credentials. Shape Security, Hickman Palermo Becker Bingham, July 14, 2015: US09083739 (3 worldwide citation)

In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modi ...


6
Justin D Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R Hansen: Protecting against the introduction of alien content. Shape Security, Fish & Richardson P C, November 3, 2015: US09178908 (3 worldwide citation)

In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify ...


7
Justin D Call, Subramanian Varadarajan, Xiaochan Huang, Xiaoming Zhou, Marc R Hansen: Protecting a server computer by detecting the identity of a browser on a client computer. May 15, 2018: US09973519

A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characteriz ...


8
Justin Call, Subramanian Varadarajan, Bryan Hanks: Management of dynamic credentials. Shape Security, Hickman Palermo Becker Bingham, July 25, 2017: US09716702

In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modi ...


9
Justin D Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S Hoover: Safe intelligent content modification. Shape Security, March 20, 2018: US09923919

A computer-implemented method for deflecting abnormal computer interactions includes receiving, at a computer server system and from a client computer device that is remote from the computer server system, a request for web content; identifying, by computer analysis of mark-up code content that is r ...


10
Subramanian Varadarajan, Justin Call: Selectively protecting valid links to pages of a web site. SHAPE SECURITY, Hickman Palermo Becker Bingham, April 11, 2017: US09621583

In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining t ...