Patents Assigned to SHAPE SECURITY, INC.
  • Patent number: 9405851
    Abstract: This document describes, among other things, a computer-implemented method that can include receiving, from a web server system, web page code to be provided over the internet to a computing device. The web page code can correspond to a particular web page served by the web server system. The method may include generating an intermediate representation of at least a portion of the web page code, and comparing the intermediate representation to a prior intermediate representation of the particular web page. Based on a result of the comparison, the method can include determining what portion of the web page code to analyze for re-coding of the web page code before serving the web page code to the computing device.
    Type: Grant
    Filed: November 17, 2014
    Date of Patent: August 2, 2016
    Assignee: Shape Security, Inc.
    Inventors: Oscar H. Steele, III, Justin D. Call
  • Patent number: 9405910
    Abstract: The automated, real-time detection of specific blocks of code within a larger body of source code is described. Specific implementations relate to the detection of known code libraries in web page code to improve the efficiency of the generation of polymorphic transformations of the web page code for the purpose of impeding automated cyber-attacks.
    Type: Grant
    Filed: June 2, 2014
    Date of Patent: August 2, 2016
    Assignee: Shape Security, Inc.
    Inventors: Ariya Hidayat, Bei Zhang
  • Patent number: 9356954
    Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.
    Type: Grant
    Filed: February 10, 2015
    Date of Patent: May 31, 2016
    Assignee: Shape Security, Inc.
    Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
  • Patent number: 9338143
    Abstract: A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet; modifying the computer code to obscure operation of the web server system that could be determined from the computer code; generating transformation information that is needed in order to reverse the modifications of the computer code to obscure the operation of the web server system; and serving to the computing client the modified code and the reverse transformation information.
    Type: Grant
    Filed: October 16, 2013
    Date of Patent: May 10, 2016
    Assignee: Shape Security, Inc.
    Inventors: Marc R. Hansen, Sumit Agarwal, Subramanian Varadarajan, Justin D. Call
  • Patent number: 9325734
    Abstract: A computer-implemented method includes receiving, at a computer security server system located between the Internet and a client computing device that makes requests over the Internet, a request for content directed to a particular content server system; forwarding the received request, with the computer security server system, to the particular content server system; receiving code from the particular server system in response to the request; applying a security countermeasure to the received code to created transformed code; providing the transformed code to the client computing device; receiving a communication from the client computing device; and determining that software on the client computing device has attempted to interact with the received code rather than the transformed code.
    Type: Grant
    Filed: December 15, 2014
    Date of Patent: April 26, 2016
    Assignee: Shape Security, Inc.
    Inventors: Timothy Dylan Peacock, Justin D. Call, Siying Yang, Sumit Agarwal
  • Patent number: 9275222
    Abstract: Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for reliable identification of computing devices. The method can include receiving, by a computing system, a request from a computing device for an electronic resource. The computing system can identify a security token received from the device that made the request. Based on the security token, particular security countermeasures can be selected that are to be applied to the electronic resource to be served in response to the request. The countermeasures can be operable to interfere with an ability of malware to interact with the served electronic resource when the served electronic resource is on the computing device. Portions of the electronic resource that are to be executed on the computing device can be re-coded using the selected particular security countermeasures.
    Type: Grant
    Filed: July 2, 2015
    Date of Patent: March 1, 2016
    Assignee: Shape Security, Inc.
    Inventor: Siying Yang
  • Patent number: 9270647
    Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.
    Type: Grant
    Filed: December 6, 2013
    Date of Patent: February 23, 2016
    Assignee: Shape Security, Inc.
    Inventor: Justin Call
  • Patent number: 9258274
    Abstract: An API call filtering system filters responses to API call requests received, via a network, from user devices. The API call filtering system is configured to require personalized API call requests wherein each API call (except for some minor exceptions) includes a unique endpoint identifier (“UEID”) of the user device making the request. Using the UEID, the web service or other service protected by the API call filtering system can be secured against excessive request iterations from a set of rogue user devices while allowing for ordinary volumes of requests of requests the user devices, wherein one or more boundaries between what is deemed to be an ordinary volume of requests and what is deemed to be excessive request iterations are determined by predetermined criteria.
    Type: Grant
    Filed: July 9, 2014
    Date of Patent: February 9, 2016
    Assignee: SHAPE SECURITY, INC.
    Inventor: Marc Hansen
  • Patent number: 9225729
    Abstract: A computer-implemented method includes serving, from a computer server system and to a plurality of different computing devices remote from the computer server system, web code and code for reporting status of the computing devices; receiving from one or more of the computing devices, first data that indicates a parameter of the one or more computing devices, the first data in a compressed format; receiving from one or more others of the computing devices, second data that indicates the parameter of the one or more others of the computing devices, the second data in an uncompressed format; and compressing the second data and comparing the compressed second data to the first data to correlate the first data to the second data. The code for reporting status of the computing devices can include code for allowing the computing devices to determine whether to send the first or second data.
    Type: Grant
    Filed: January 21, 2014
    Date of Patent: December 29, 2015
    Assignee: Shape Security, Inc.
    Inventors: Daniel G Moen, Bryan D Hanks
  • Patent number: 9225737
    Abstract: A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characterize the subsets of the particular document object models; and using the clusters to identify alien content on the particular client computers, wherein the alien content comprises content in the document object models that is not the result of content that is the basis of the document object model served.
    Type: Grant
    Filed: October 16, 2013
    Date of Patent: December 29, 2015
    Assignee: Shape Security, Inc.
    Inventors: Justin D. Call, Subramanian Varadarajan, Xiaohan Huang, Xiaoming Zhou, Marc R. Hansen
  • Patent number: 9210171
    Abstract: In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first protected link that is different than the first link and includes first data that authenticates a first request that has been generated based on the first protected link and that references the first target page; and generating a first decoy link that includes second data that references a first decoy page and not the first target page; rendering a second set of instructions comprising the first protected link and the first decoy link, but not the first link, and which is configured to cause a first client computer to present the first protected link in the user interfac
    Type: Grant
    Filed: May 29, 2014
    Date of Patent: December 8, 2015
    Assignee: Shape Security, Inc.
    Inventors: Subramanian Varadarajan, Justin Call
  • Publication number: 20150350213
    Abstract: In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first protected link that is different than the first link and includes first data that authenticates a first request that has been generated based on the first protected link and that references the first target page; and generating a first decoy link that includes second data that references a first decoy page and not the first target page; rendering a second set of instructions comprising the first protected link and the first decoy link, but not the first link, and which is configured to cause a first client computer to present the first protected link in the user interfac
    Type: Application
    Filed: May 29, 2014
    Publication date: December 3, 2015
    Applicant: Shape Security, Inc.
    Inventors: SUBRAMANIAN VARADARAJAN, JUSTIN CALL
  • Publication number: 20150347756
    Abstract: The automated, real-time detection of specific blocks of code within a larger body of source code is described. Specific implementations relate to the detection of known code libraries in web page code to improve the efficiency of the generation of polymorphic transformations of the web page code for the purpose of impeding automated cyber-attacks.
    Type: Application
    Filed: June 2, 2014
    Publication date: December 3, 2015
    Applicant: Shape Security, Inc.
    Inventors: Ariya Hidayat, Bei Zhang
  • Publication number: 20150339479
    Abstract: A computer-implemented method includes identifying, in web code to be served to a client, presence of code for generating a form; generating additional, executable code to be run on the client device, the additional, executable code being arranged to identify user input on the client device and modify the form so that data from the user input is received into one or more alternative fields of the form other than a first field to which a user performing the input directed the input; receiving a request from the client device based on completion of input into the form; and converting data from the received request so that data for the one or more alternative fields of the form is directed to the first field of the form for processing by a web server system that initially generated the web code.
    Type: Application
    Filed: May 23, 2014
    Publication date: November 26, 2015
    Applicant: Shape Security Inc.
    Inventors: Xinran Wang, Yao Zhao
  • Patent number: 9178908
    Abstract: In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client.
    Type: Grant
    Filed: October 16, 2013
    Date of Patent: November 3, 2015
    Assignee: Shape Security, Inc.
    Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
  • Patent number: 9158893
    Abstract: A code finder system deployed as a software module, a web service or as part of a larger security system, identifies and processes well-formed code sequences. For a data flow that is expected to be free of executable or interpreted code, or free of one or more known styles of executable or interpreted code, the code finder system can protect participants in the communications network. Examples of payload carried by data flows that can be monitored include, but are not limited to, user input data provided as part of interacting with a web application, data files or entities, such as images or videos, and user input data provided as part of interacting with a desktop application.
    Type: Grant
    Filed: June 19, 2012
    Date of Patent: October 13, 2015
    Assignee: Shape Security, Inc.
    Inventors: Justin David Call, Oscar Hunter Steele, III
  • Publication number: 20150271188
    Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless browser, the first set of instructions without presenting the user interface; rendering a second set of instructions, which when executed by a client application on a client computer, cause the client computer to present the user interface, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the client computer.
    Type: Application
    Filed: March 18, 2014
    Publication date: September 24, 2015
    Applicant: SHAPE SECURITY, INC.
    Inventor: Justin Call
  • Patent number: 9112900
    Abstract: A computer-implemented method includes receiving, at a computer security server system located between the Internet and a client computing device that makes requests over the Internet, a request for content directed to a particular content server system; forwarding the received request, with the computer security server system, to the particular content server system; receiving code from the particular server system in response to the request; applying a security countermeasure to the received code to created transformed code; providing the transformed code to the client computing device; receiving a communication from the client computing device; and determining that software on the client computing device has attempted to interact with the received code rather than the transformed code.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: August 18, 2015
    Assignee: Shape Security, Inc.
    Inventors: Timothy Dylan Peacock, Justin D. Call, Siying Yang, Sumit Agarwal
  • Patent number: 9083739
    Abstract: In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.
    Type: Grant
    Filed: May 29, 2014
    Date of Patent: July 14, 2015
    Assignee: Shape Security, Inc.
    Inventors: Justin Call, Subramanian Varadarajan, Bryan Hanks
  • Patent number: 9075990
    Abstract: Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for reliable identification of computing devices. The method can include receiving, by a computing system, a request from a computing device for an electronic resource. The computing system can identify a security token received from the device that made the request. Based on the security token, particular security countermeasures can be selected that are to be applied to the electronic resource to be served in response to the request. The countermeasures can be operable to interfere with an ability of malware to interact with the served electronic resource when the served electronic resource is on the computing device. Portions of the electronic resource that are to be executed on the computing device can be re-coded using the selected particular security countermeasures.
    Type: Grant
    Filed: July 1, 2014
    Date of Patent: July 7, 2015
    Assignee: Shape Security, Inc.
    Inventor: Siying Yang