Patents by Inventor Justin Call
Justin Call has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170318052Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.Type: ApplicationFiled: July 17, 2017Publication date: November 2, 2017Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
-
Patent number: 9800602Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.Type: GrantFiled: September 30, 2014Date of Patent: October 24, 2017Assignee: Shape Security, Inc.Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
-
Publication number: 20170300184Abstract: An uncategorized financial transaction display includes a listing of uncategorized financial transactions and personal and business display regions, the personal uncategorized financial transaction display region being associated with a personal financial transaction category and a business uncategorized financial transaction display region being associated with a business financial transaction category. A user is provided the capability to categorize each of the uncategorized financial transactions by selecting an uncategorized financial transaction listed in the uncategorized financial transaction display and making a sweeping motion to either the personal or business display region of the uncategorized financial transaction display. Once a user makes a sweeping motion to either the personal or business display region, the user is provided sub-category options within the uncategorized financial transaction display and an indication of the tax ramifications of the selected categorization.Type: ApplicationFiled: April 14, 2016Publication date: October 19, 2017Applicant: Intuit Inc.Inventors: Justin Calles, Jean-Luc Delpech, Scott Garten, Braden Young
-
Publication number: 20170257385Abstract: In an approach, an apparatus comprises: one or more processors; a processor logic coupled to the one or more processors and configured to: intercept, from a client computer, a request directed to a server computer that identifies a purported user agent executing on the client computer; send, to the server computer, the request from the client computer; intercept, from the server computer, one or more original instructions to be executed by the purported user agent of the client computer; determine one or more features supported by the purported user agent that are not utilized by the one or more original instructions; transform the one or more original instructions into one or more revised instructions which, when executed by the purported user agent, cause the purported user agent to utilize the one or more features; send, to the client computer, the one or more revised instructions.Type: ApplicationFiled: March 2, 2016Publication date: September 7, 2017Inventors: JARROD S. OVERSON, ARIYA HIDAYAT, MICHAEL FICARRA, BEI ZHANG, JUSTIN CALL
-
Patent number: 9716702Abstract: In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.Type: GrantFiled: June 14, 2015Date of Patent: July 25, 2017Assignee: Shape Security, Inc.Inventors: Justin Call, Subramanian Varadarajan, Bryan Hanks
-
Patent number: 9712561Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.Type: GrantFiled: May 18, 2016Date of Patent: July 18, 2017Assignee: Shape Security, Inc.Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
-
Patent number: 9621583Abstract: In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first decoy link that corresponds to the first link, wherein the first decoy link includes data that references a first decoy page which includes false information; rendering a second set of instructions that defines the first decoy link, wherein the second set of instructions is configured to cause a first client computer to hide the first decoy link from the user interface; sending the second set of instructions to the first client computer.Type: GrantFiled: October 27, 2015Date of Patent: April 11, 2017Assignee: SHAPE SECURITY, INC.Inventors: Subramanian Varadarajan, Justin Call
-
Patent number: 9608975Abstract: Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”.Type: GrantFiled: March 30, 2015Date of Patent: March 28, 2017Assignee: SHAPE SECURITY, INC.Inventors: Ariya Hidayat, Justin Call
-
Patent number: 9544329Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless browser, the first set of instructions without presenting the user interface; rendering a second set of instructions, which when executed by a client application on a client computer, cause the client computer to present the user interface, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the client computer.Type: GrantFiled: March 18, 2014Date of Patent: January 10, 2017Assignee: Shape Security, Inc.Inventor: Justin Call
-
Publication number: 20160294796Abstract: Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”.Type: ApplicationFiled: March 30, 2015Publication date: October 6, 2016Inventors: ARIYA HIDAYAT, JUSTIN CALL
-
Publication number: 20160261629Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.Type: ApplicationFiled: May 18, 2016Publication date: September 8, 2016Inventors: XIAOMING ZHOU, ROGER HOOVER, SERGEY SHEKYAN, JUSTIN CALL
-
Patent number: 9356954Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.Type: GrantFiled: February 10, 2015Date of Patent: May 31, 2016Assignee: Shape Security, Inc.Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
-
Publication number: 20160094575Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
-
Publication number: 20160057111Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.Type: ApplicationFiled: October 30, 2015Publication date: February 25, 2016Inventor: Justin Call
-
Patent number: 9270647Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.Type: GrantFiled: December 6, 2013Date of Patent: February 23, 2016Assignee: Shape Security, Inc.Inventor: Justin Call
-
Publication number: 20160050231Abstract: In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first protected link that is different than the first link and includes first data that authenticates a first request that has been generated based on the first protected link and that references the first target page; and generating a first decoy link that includes second data that references a first decoy page and not the first target page; rendering a second set of instructions comprising the first protected link and the first decoy link, but not the first link, and which is configured to cause a first client computer to present the first protected link in the user interfacType: ApplicationFiled: October 27, 2015Publication date: February 18, 2016Inventors: SUBRAMANIAN VARADARAJAN, JUSTIN CALL
-
Patent number: 9210171Abstract: In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first protected link that is different than the first link and includes first data that authenticates a first request that has been generated based on the first protected link and that references the first target page; and generating a first decoy link that includes second data that references a first decoy page and not the first target page; rendering a second set of instructions comprising the first protected link and the first decoy link, but not the first link, and which is configured to cause a first client computer to present the first protected link in the user interfacType: GrantFiled: May 29, 2014Date of Patent: December 8, 2015Assignee: Shape Security, Inc.Inventors: Subramanian Varadarajan, Justin Call
-
Publication number: 20150350213Abstract: In an embodiment, a method comprises intercepting, using a server computer, a first set of instructions that define a user interface and a plurality of links, wherein each link in the plurality of links is associated with a target page, and the plurality of links includes a first link; determining that the first link, which references a first target page, is protected; in response to determining the first link is protected: generating a first protected link that is different than the first link and includes first data that authenticates a first request that has been generated based on the first protected link and that references the first target page; and generating a first decoy link that includes second data that references a first decoy page and not the first target page; rendering a second set of instructions comprising the first protected link and the first decoy link, but not the first link, and which is configured to cause a first client computer to present the first protected link in the user interfacType: ApplicationFiled: May 29, 2014Publication date: December 3, 2015Applicant: Shape Security, Inc.Inventors: SUBRAMANIAN VARADARAJAN, JUSTIN CALL
-
Publication number: 20150350181Abstract: In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.Type: ApplicationFiled: June 14, 2015Publication date: December 3, 2015Inventors: JUSTIN CALL, SUBRAMANIAN VARADARAJAN, BRYAN HANKS
-
Publication number: 20150271188Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless browser, the first set of instructions without presenting the user interface; rendering a second set of instructions, which when executed by a client application on a client computer, cause the client computer to present the user interface, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the client computer.Type: ApplicationFiled: March 18, 2014Publication date: September 24, 2015Applicant: SHAPE SECURITY, INC.Inventor: Justin Call