会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • SYSTEM AND METHOD FOR INTEGRATION OF BROWSER-BASED THIN CLIENT APPLICATIONS WITHIN DESKTOP RICH CLIENT ARCHITECTURE
    • 基于浏览器的客户端应用程序集成在客户端架构中的系统和方法
    • US20100057836A1
    • 2010-03-04
    • US12203816
    • 2008-09-03
    • Ananthalakshmi Anbuselvan
    • Ananthalakshmi Anbuselvan
    • G06F15/16
    • G06F8/70
    • Techniques for facilitating the reuse of a browser-based thin client of a client-server application in a browser-independent context. These techniques may be used, for instance, to integrate the functionality of a browser-based thin client in a desktop-based, rich client infrastructure. In one set of embodiments, these techniques include determining one or more browser dependencies that require the thin client to operate within a web browser. For example, the thin client may depend on a web browser to handle application security, the loading/caching of client-side files, the receipt/passing of application parameters, and the like. These browser dependencies are then eliminated. As a result, the thin client can be subsequently reused without the presence of a web browser. In one set of embodiments, this process is performed by a conversion utility that automatically converts program code for the browser-based thin client into program code for a browser-independent client application.
    • 用于在浏览器无关的上下文中促进客户端 - 服务器应用程序的基于浏览器的瘦客户机的重用的技术。 例如,这些技术可以用于将基于浏览器的瘦客户机的功能集成到基于桌面的富客户端基础设施中。 在一组实施例中,这些技术包括确定需要瘦客户机在web浏览器内操作的一个或多个浏览器依赖性。 例如,瘦客户端可以依赖于web浏览器来处理应用程序安全性,客户端文件的加载/缓存,应用程序参数的接收/传递等。 然后,这些浏览器依赖关系被消除。 因此,瘦客户机可以随后重新使用而不需要网页浏览器。 在一组实施例中,该过程由转换实用程序执行,该转换实用程序自动将基于浏览器的瘦客户端的程序代码转换为用于独立于浏览器的客户端应用程序的程序代码。
    • 3. 发明授权
    • System and method for integration of browser-based thin client applications within desktop rich client architecture
    • 在桌面丰富客户端架构中集成基于浏览器的瘦客户端应用程序的系统和方法
    • US08996658B2
    • 2015-03-31
    • US12203816
    • 2008-09-03
    • Ananthalakshmi Anbuselvan
    • Ananthalakshmi Anbuselvan
    • G06F15/16G06F9/44
    • G06F8/70
    • Techniques for facilitating the reuse of a browser-based thin client of a client-server application in a browser-independent context. These techniques may be used, for instance, to integrate the functionality of a browser-based thin client in a desktop-based, rich client infrastructure. In one set of embodiments, these techniques include determining one or more browser dependencies that require the thin client to operate within a web browser. For example, the thin client may depend on a web browser to handle application security, the loading/caching of client-side files, the receipt/passing of application parameters, and the like. These browser dependencies are then eliminated. As a result, the thin client can be subsequently reused without the presence of a web browser. In one set of embodiments, this process is performed by a conversion utility that automatically converts program code for the browser-based thin client into program code for a browser-independent client application.
    • 用于在浏览器无关的上下文中促进客户端 - 服务器应用程序的基于浏览器的瘦客户机的重用的技术。 例如,这些技术可以用于将基于浏览器的瘦客户机的功能集成到基于桌面的富客户端基础设施中。 在一组实施例中,这些技术包括确定需要瘦客户机在web浏览器内操作的一个或多个浏览器依赖性。 例如,瘦客户端可以依赖于web浏览器来处理应用程序安全性,客户端文件的加载/缓存,应用程序参数的接收/传递等。 然后,这些浏览器依赖关系被消除。 因此,瘦客户机可以随后重新使用而不需要网页浏览器。 在一组实施例中,该过程由转换实用程序执行,该转换实用程序自动将基于浏览器的瘦客户端的程序代码转换为用于独立于浏览器的客户端应用程序的程序代码。
    • 4. 发明申请
    • SECURE FRAMEWORK FOR INVOKING SERVER-SIDE APIS USING AJAX
    • 使用AJAX调用服务器端APIS的安全框架
    • US20100146291A1
    • 2010-06-10
    • US12330008
    • 2008-12-08
    • Ananthalakshmi Anbuselvan
    • Ananthalakshmi Anbuselvan
    • G06F12/14H04L9/32G06F7/06G06F17/30
    • H04L63/08H04L63/123H04L63/1441
    • Techniques for securely invoking a server-side API from client-side Web application code using AJAX. In one set of embodiments, a request to invoke a server-side API is received from a client-side component of a Web application, where the request is sent asynchronously using AJAX. One or more security handlers are then invoked to process the request in a manner that mitigates various security attacks. In one embodiment, a security handler is invoked to defend against a plurality of different types of Web application/AJAX security attacks. In another embodiment, authentication and authorization security handlers are invoked to authenticate a user of the Web application that originated the request and determine whether the user is authorized to call the server-side API. In yet another embodiment, configuration is implemented at the data storage tier to enforce user-access and data security on data that is retrieved/stored as a result of invoking the server-side API.
    • 使用AJAX从客户端Web应用程序代码安全地调用服务器端API的技术。 在一组实施例中,从Web应用的客户端组件接收到调用服务器端API的请求,其中使用AJAX以异步方式发送请求。 然后调用一个或多个安全处理程序来以减轻各种安全攻击的方式处理请求。 在一个实施例中,调用安全处理程序以抵御多种不同类型的Web应用/ AJAX安全攻击。 在另一个实施例中,调用认证和授权安全处理程序来认证发起请求的Web应用的用户,并确定用户是否被授权呼叫服务器端API。 在另一个实施例中,在数据存储层上实现配置,以便对作为调用服务器端API的结果检索/存储的数据实施用户访问和数据安全性。
    • 6. 发明授权
    • Secure framework for invoking server-side APIs using AJAX
    • 使用AJAX调用服务器端API的安全框架
    • US08332654B2
    • 2012-12-11
    • US12330008
    • 2008-12-08
    • Ananthalakshmi Anbuselvan
    • Ananthalakshmi Anbuselvan
    • G06F11/30G06F9/44
    • H04L63/08H04L63/123H04L63/1441
    • Techniques for securely invoking a server-side API from client-side Web application code using AJAX. In one set of embodiments, a request to invoke a server-side API is received from a client-side component of a Web application, where the request is sent asynchronously using AJAX. One or more security handlers are then invoked to process the request in a manner that mitigates various security attacks. In one embodiment, a security handler is invoked to defend against a plurality of different types of Web application/AJAX security attacks. In another embodiment, authentication and authorization security handlers are invoked to authenticate a user of the Web application that originated the request and determine whether the user is authorized to call the server-side API. In yet another embodiment, configuration is implemented at the data storage tier to enforce user-access and data security on data that is retrieved/stored as a result of invoking the server-side API.
    • 使用AJAX从客户端Web应用程序代码安全地调用服务器端API的技术。 在一组实施例中,从Web应用的客户端组件接收到调用服务器端API的请求,其中使用AJAX以异步方式发送请求。 然后调用一个或多个安全处理程序来以减轻各种安全攻击的方式处理请求。 在一个实施例中,调用安全处理程序以抵御多种不同类型的Web应用/ AJAX安全攻击。 在另一个实施例中,调用认证和授权安全处理程序来认证发起请求的Web应用的用户,并确定用户是否被授权呼叫服务器端API。 在另一个实施例中,在数据存储层上实现配置,以便对作为调用服务器端API的结果检索/存储的数据实施用户访问和数据安全性。