Patents by Inventor Justin Call

Justin Call has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170318052
    Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.
    Type: Application
    Filed: July 17, 2017
    Publication date: November 2, 2017
    Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
  • Patent number: 9800602
    Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: October 24, 2017
    Assignee: Shape Security, Inc.
    Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
  • Publication number: 20170300184
    Abstract: An uncategorized financial transaction display includes a listing of uncategorized financial transactions and personal and business display regions, the personal uncategorized financial transaction display region being associated with a personal financial transaction category and a business uncategorized financial transaction display region being associated with a business financial transaction category. A user is provided the capability to categorize each of the uncategorized financial transactions by selecting an uncategorized financial transaction listed in the uncategorized financial transaction display and making a sweeping motion to either the personal or business display region of the uncategorized financial transaction display. Once a user makes a sweeping motion to either the personal or business display region, the user is provided sub-category options within the uncategorized financial transaction display and an indication of the tax ramifications of the selected categorization.
    Type: Application
    Filed: April 14, 2016
    Publication date: October 19, 2017
    Applicant: Intuit Inc.
    Inventors: Justin Calles, Jean-Luc Delpech, Scott Garten, Braden Young
  • Publication number: 20170257385
    Abstract: In an approach, an apparatus comprises: one or more processors; a processor logic coupled to the one or more processors and configured to: intercept, from a client computer, a request directed to a server computer that identifies a purported user agent executing on the client computer; send, to the server computer, the request from the client computer; intercept, from the server computer, one or more original instructions to be executed by the purported user agent of the client computer; determine one or more features supported by the purported user agent that are not utilized by the one or more original instructions; transform the one or more original instructions into one or more revised instructions which, when executed by the purported user agent, cause the purported user agent to utilize the one or more features; send, to the client computer, the one or more revised instructions.
    Type: Application
    Filed: March 2, 2016
    Publication date: September 7, 2017
    Inventors: JARROD S. OVERSON, ARIYA HIDAYAT, MICHAEL FICARRA, BEI ZHANG, JUSTIN CALL
  • Patent number: 9716702
    Abstract: In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.
    Type: Grant
    Filed: June 14, 2015
    Date of Patent: July 25, 2017
    Assignee: Shape Security, Inc.
    Inventors: Justin Call, Subramanian Varadarajan, Bryan Hanks
  • Patent number: 9712561
    Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.
    Type: Grant
    Filed: May 18, 2016
    Date of Patent: July 18, 2017
    Assignee: Shape Security, Inc.
    Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
  • Patent number: 9621583
    Abstract: In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first decoy link that corresponds to the first link, wherein the first decoy link includes data that references a first decoy page which includes false information; rendering a second set of instructions that defines the first decoy link, wherein the second set of instructions is configured to cause a first client computer to hide the first decoy link from the user interface; sending the second set of instructions to the first client computer.
    Type: Grant
    Filed: October 27, 2015
    Date of Patent: April 11, 2017
    Assignee: SHAPE SECURITY, INC.
    Inventors: Subramanian Varadarajan, Justin Call
  • Patent number: 9608975
    Abstract: Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: March 28, 2017
    Assignee: SHAPE SECURITY, INC.
    Inventors: Ariya Hidayat, Justin Call
  • Patent number: 9544329
    Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless browser, the first set of instructions without presenting the user interface; rendering a second set of instructions, which when executed by a client application on a client computer, cause the client computer to present the user interface, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the client computer.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: January 10, 2017
    Assignee: Shape Security, Inc.
    Inventor: Justin Call
  • Publication number: 20160294796
    Abstract: Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”.
    Type: Application
    Filed: March 30, 2015
    Publication date: October 6, 2016
    Inventors: ARIYA HIDAYAT, JUSTIN CALL
  • Publication number: 20160261629
    Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.
    Type: Application
    Filed: May 18, 2016
    Publication date: September 8, 2016
    Inventors: XIAOMING ZHOU, ROGER HOOVER, SERGEY SHEKYAN, JUSTIN CALL
  • Patent number: 9356954
    Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.
    Type: Grant
    Filed: February 10, 2015
    Date of Patent: May 31, 2016
    Assignee: Shape Security, Inc.
    Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
  • Publication number: 20160094575
    Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.
    Type: Application
    Filed: September 30, 2014
    Publication date: March 31, 2016
    Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
  • Publication number: 20160057111
    Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.
    Type: Application
    Filed: October 30, 2015
    Publication date: February 25, 2016
    Inventor: Justin Call
  • Patent number: 9270647
    Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.
    Type: Grant
    Filed: December 6, 2013
    Date of Patent: February 23, 2016
    Assignee: Shape Security, Inc.
    Inventor: Justin Call
  • Publication number: 20160050231
    Abstract: In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first protected link that is different than the first link and includes first data that authenticates a first request that has been generated based on the first protected link and that references the first target page; and generating a first decoy link that includes second data that references a first decoy page and not the first target page; rendering a second set of instructions comprising the first protected link and the first decoy link, but not the first link, and which is configured to cause a first client computer to present the first protected link in the user interfac
    Type: Application
    Filed: October 27, 2015
    Publication date: February 18, 2016
    Inventors: SUBRAMANIAN VARADARAJAN, JUSTIN CALL
  • Patent number: 9210171
    Abstract: In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first protected link that is different than the first link and includes first data that authenticates a first request that has been generated based on the first protected link and that references the first target page; and generating a first decoy link that includes second data that references a first decoy page and not the first target page; rendering a second set of instructions comprising the first protected link and the first decoy link, but not the first link, and which is configured to cause a first client computer to present the first protected link in the user interfac
    Type: Grant
    Filed: May 29, 2014
    Date of Patent: December 8, 2015
    Assignee: Shape Security, Inc.
    Inventors: Subramanian Varadarajan, Justin Call
  • Publication number: 20150350213
    Abstract: In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first protected link that is different than the first link and includes first data that authenticates a first request that has been generated based on the first protected link and that references the first target page; and generating a first decoy link that includes second data that references a first decoy page and not the first target page; rendering a second set of instructions comprising the first protected link and the first decoy link, but not the first link, and which is configured to cause a first client computer to present the first protected link in the user interfac
    Type: Application
    Filed: May 29, 2014
    Publication date: December 3, 2015
    Applicant: Shape Security, Inc.
    Inventors: SUBRAMANIAN VARADARAJAN, JUSTIN CALL
  • Publication number: 20150350181
    Abstract: In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.
    Type: Application
    Filed: June 14, 2015
    Publication date: December 3, 2015
    Inventors: JUSTIN CALL, SUBRAMANIAN VARADARAJAN, BRYAN HANKS
  • Publication number: 20150271188
    Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless browser, the first set of instructions without presenting the user interface; rendering a second set of instructions, which when executed by a client application on a client computer, cause the client computer to present the user interface, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the client computer.
    Type: Application
    Filed: March 18, 2014
    Publication date: September 24, 2015
    Applicant: SHAPE SECURITY, INC.
    Inventor: Justin Call