Patents by Inventor Sergey Shekyan
Sergey Shekyan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10868819Abstract: In an embodiment, a computer system is configured to improve security of server computers interacting with client computers through an intermediary computer, and comprising: a memory comprising processor logic; one or more processors coupled to the memory, wherein the one or more processors execute the processor logic, which causes the one or more processors to: intercept, from a server computer, one or more original instructions to be sent to a browser being executed on a client computer; inject, into the one or more original instructions, one or more browser detection instructions, which when executed cause one or more operations to be performed by an execution environment on the client computer and send a result that represents an internal state of the execution environment after performing the one or more operations to the intermediary computer; send the one or more original instructions with the one or more browser detection instructions to the browser; receive the result and determine whether the browseType: GrantFiled: May 15, 2019Date of Patent: December 15, 2020Assignee: SHAPE SECURITY, INC.Inventors: Bei Zhang, Sergey Shekyan
-
Patent number: 10826872Abstract: Techniques are provided for a security policy for browser extensions. A first pattern is determined that is present in requests from client computing devices when a first browser extension is operating on the client computing devices. The first pattern is identified in a first request from a first client computing device to a first web server system. It is determined, based on identifying the first pattern in the first request, that the first browser extension is associated with the first request. It is determined that the first browser extension associated with the first request is whitelisted with respect to the first web server system based on a security policy. In response to determining that the first browser extension is whitelisted with respect to the first web server system, a first automated response is performed that causes the first web server system to process the first request.Type: GrantFiled: December 30, 2018Date of Patent: November 3, 2020Assignee: SHAPE SECURITY, INC.Inventors: Siying Yang, Sergey Shekyan
-
Patent number: 10652275Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.Type: GrantFiled: April 5, 2018Date of Patent: May 12, 2020Assignee: Shape Security, Inc.Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
-
Publication number: 20190394223Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.Type: ApplicationFiled: August 27, 2019Publication date: December 26, 2019Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
-
Publication number: 20190373012Abstract: A computer system configured to improve security of server computers interacting with client computers, the system comprising: one or more processors executing instructions that cause the one or more processors to: select, from the plurality of detection tests, one or more first detection tests to be performed by a client computer; send, to the client computer, a first set of detection instructions that define the one or more first detection tests, and which when executed causes generating a first set of results that identifies a first set of characteristics of the client computer; receive the first set of results from the client computer; select one or more first countermeasures from a plurality of countermeasures based on the first set of characteristics identified in the first set of results; send, to the client computer, a first set of countermeasure instructions that define the one or more first countermeasures.Type: ApplicationFiled: June 18, 2019Publication date: December 5, 2019Applicant: Shape Security, Inc.Inventors: Eli Mattson, Carl Schroeder, Bei Zhang, Sergey Shekyan, Salman Saghafi, Jarrod Overson, Lewis Ellis
-
Publication number: 20190268359Abstract: In an embodiment, a computer system is configured to improve security of server computers interacting with client computers through an intermediary computer, and comprising: a memory comprising processor logic; one or more processors coupled to the memory, wherein the one or more processors execute the processor logic, which causes the one or more processors to: intercept, from a server computer, one or more original instructions to be sent to a browser being executed on a client computer; inject, into the one or more original instructions, one or more browser detection instructions, which when executed cause one or more operations to be performed by an execution environment on the client computer and send a result that represents an internal state of the execution environment after performing the one or more operations to the intermediary computer; send the one or more original instructions with the one or more browser detection instructions to the browser; receive the result and determine whether the browseType: ApplicationFiled: May 15, 2019Publication date: August 29, 2019Inventors: BEI ZHANG, SERGEY SHEKYAN
-
Patent number: 10397265Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.Type: GrantFiled: July 23, 2018Date of Patent: August 27, 2019Assignee: SHAPE SECURITY, INC.Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
-
Publication number: 20190215304Abstract: Techniques are provided for a security policy for browser extensions. Second detection code, when executed at a second client computing device, gathers and transmits information relating to browser extensions operating on the second client computing device. second browser extension data generated by the second detection code is received. It is determined, based the second browser extension data, that a second browser extension operating on the second client computing device is associated with a second request from the second client computing device to the first web server system. It is determined that the second browser extension is not whitelisted with respect to the first web server system. In response to determining that the second browser extension is not whitelisted with respect to the first web server system, performing a second automated response that causes the first web server system to not process the second request.Type: ApplicationFiled: December 30, 2018Publication date: July 11, 2019Applicant: Shape Security, Inc.Inventors: Siying Yang, Sergey Shekyan
-
Patent number: 10326790Abstract: A computer system configured to improve security of server computers interacting with client computers, the system comprising: one or more processors executing instructions that cause the one or more processors to: select, from the plurality of detection tests, one or more first detection tests to be performed by a client computer; send, to the client computer, a first set of detection instructions that define the one or more first detection tests, and which when executed causes generating a first set of results that identifies a first set of characteristics of the client computer; receive the first set of results from the client computer; select one or more first countermeasures from a plurality of countermeasures based on the first set of characteristics identified in the first set of results; send, to the client computer, a first set of countermeasure instructions that define the one or more first countermeasures.Type: GrantFiled: February 10, 2017Date of Patent: June 18, 2019Inventors: Eli Mattson, Carl Schroeder, Bei Zhang, Sergey Shekyan, Salman Saghafi, Jarrod Overson, Lewis Ellis
-
Patent number: 10298599Abstract: In an embodiment, a computer system is configured to improve security of server computers interacting with client computers through an intermediary computer, and comprising: a memory comprising processor logic; one or more processors coupled to the memory, wherein the one or more processors execute the processor logic, which causes the one or more processors to: intercept, from a server computer, one or more original instructions to be sent to a browser being executed on a client computer; inject, into the one or more original instructions, one or more browser detection instructions, which when executed cause one or more operations to be performed by an execution environment on the client computer and send a result that represents an internal state of the execution environment after performing the one or more operations to the intermediary computer; send the one or more original instructions with the one or more browser detection instructions to the browser; receive the result and determine whether the browseType: GrantFiled: September 18, 2015Date of Patent: May 21, 2019Assignee: SHAPE SECURITY, INC.Inventors: Bei Zhang, Sergey Shekyan
-
Patent number: 10212130Abstract: Methods and apparatus are described for detecting browser extensions. Specific implementations relate to configurable security policies and automated actions performed in response to the detection of browser extensions.Type: GrantFiled: November 16, 2015Date of Patent: February 19, 2019Assignee: Shape Security, Inc.Inventors: Siying Yang, Sergey Shekyan
-
Publication number: 20190007444Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.Type: ApplicationFiled: July 23, 2018Publication date: January 3, 2019Applicant: SHAPE SECURITY, INC.Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
-
Patent number: 10108801Abstract: Present example embodiments relate generally to scanning websites, wherein the devices, methods, and logic for the scanning comprises receiving interaction information between a user computing device and a web application of the website; dynamically determining an action to be performed to the web application that approximately simulates the user computing device interacting with the web application, wherein the action is dynamically determined based on the received interaction information; establishing a browsing session with the website; discovering the web application within the website; and identifying a vulnerability of the web application by interacting with the web application using the action.Type: GrantFiled: November 15, 2012Date of Patent: October 23, 2018Assignee: Qualys, Inc.Inventors: Michael P. Shema, Vaagn Toukharian, Sergey Shekyan
-
Publication number: 20180227325Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.Type: ApplicationFiled: April 5, 2018Publication date: August 9, 2018Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
-
Patent number: 10044753Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.Type: GrantFiled: July 17, 2017Date of Patent: August 7, 2018Assignee: Shape Security, Inc.Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
-
Patent number: 10033755Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.Type: GrantFiled: October 23, 2017Date of Patent: July 24, 2018Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
-
Publication number: 20180048671Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.Type: ApplicationFiled: October 23, 2017Publication date: February 15, 2018Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
-
Publication number: 20170318052Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.Type: ApplicationFiled: July 17, 2017Publication date: November 2, 2017Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
-
Patent number: 9800602Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.Type: GrantFiled: September 30, 2014Date of Patent: October 24, 2017Assignee: Shape Security, Inc.Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
-
Publication number: 20170237766Abstract: A computer system configured to improve security of server computers interacting with client computers, the system comprising: one or more processors executing instructions that cause the one or more processors to: select, from the plurality of detection tests, one or more first detection tests to be performed by a client computer; send, to the client computer, a first set of detection instructions that define the one or more first detection tests, and which when executed causes generating a first set of results that identifies a first set of characteristics of the client computer; receive the first set of results from the client computer; select one or more first countermeasures from a plurality of countermeasures based on the first set of characteristics identified in the first set of results; send, to the client computer, a first set of countermeasure instructions that define the one or more first countermeasures.Type: ApplicationFiled: February 10, 2017Publication date: August 17, 2017Inventors: Eli Mattson, Carl Schroeder, Bei Zhang, Sergey Shekyan, Salman Saghafi, Jarrod Overson, Lewis Ellis