Techniques and architectures for secure session usage and logging

    公开(公告)号:US11089019B2

    公开(公告)日:2021-08-10

    申请号:US15365393

    申请日:2016-11-30

    Abstract: Techniques for session security. Information corresponding to an electronic device used to access a resource is gathered. The information uniquely identifies the electronic device. Subsequent accesses to the resource during the session are monitored to determine whether changes occur to the information. A security action is taken in response to a change in the information.

    Customized user validation
    3.
    发明授权

    公开(公告)号:US10764277B2

    公开(公告)日:2020-09-01

    申请号:US16030706

    申请日:2018-07-09

    Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.

    Customized user validation
    4.
    发明授权

    公开(公告)号:US10021089B2

    公开(公告)日:2018-07-10

    申请号:US14682324

    申请日:2015-04-09

    CPC classification number: H04L63/083 H04L63/0838 H04L63/102 H04L2463/082

    Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.

    Protection via Webpage Manipulation

    公开(公告)号:US20170126719A1

    公开(公告)日:2017-05-04

    申请号:US14928340

    申请日:2015-10-30

    Abstract: Techniques are disclosed relating to limiting malicious-code analysis of webpage content. In one embodiment, a computing system receives a webpage requested by a client device. The computing system randomly alters content of the webpage to limit analysis of the content by malicious code such that the altering does not affect how the webpage is displayed by the client device. The computing system may then serve the webpage with the altered content to the client device. In some embodiments, the altering includes searching the webpage for an HTML element that specifies a plurality of attributes in a particular ordering and rearranging the plurality of attributes to have a new ordering different from the particular ordering. In some embodiments, the altering includes parsing the webpage for an HTML element that specifies an identifier attribute and modifying an identifier attribute of the element.

    Obfuscation of References to Network Resources
    6.
    发明申请
    Obfuscation of References to Network Resources 有权
    对网络资源的引用的混淆

    公开(公告)号:US20160337320A1

    公开(公告)日:2016-11-17

    申请号:US14708925

    申请日:2015-05-11

    Abstract: Techniques are disclosed relating to protecting sensitive data in references to network resources. In some embodiments, a host system receives a request for a stored resource, where a first portion of the request is encrypted by a client device using a particular encryption technique and a second portion of the request is not encrypted using the particular encryption technique and where the first portion of the request includes a reference to the resource. In some embodiments, the host decrypts the reference to the resource and provides the resource to the requesting device based on the decrypted reference.

    Abstract translation: 公开了关于在引用网络资源时保护敏感数据的技术。 在一些实施例中,主机系统接收对存储的资源的请求,其中请求的第一部分由客户端设备使用特定的加密技术加密,并且请求的第二部分不使用特定的加密技术进行加密,并且其中 请求的第一部分包括对资源的引用。 在一些实施例中,主机解密对资源的引用,并且基于解密的引用将资源提供给请求设备。

    CUSTOMIZED USER VALIDATION
    7.
    发明申请
    CUSTOMIZED USER VALIDATION 有权
    自定义用户验证

    公开(公告)号:US20160301679A1

    公开(公告)日:2016-10-13

    申请号:US14682324

    申请日:2015-04-09

    CPC classification number: H04L63/083 H04L63/0838 H04L63/102 H04L2463/082

    Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.

    Abstract translation: 定制用户验证的机制和技术。 从具有提供对一个或多个资源的访问的一个或多个计算设备的远程电子设备接收登录尝试。 分析登录尝试以从对应于登录尝试的多个简档确定简档。 一个或多个计算设备支持多个轮廓,每个轮廓具有对应的流。 在允许继续登录尝试之前执行与简档对应的流程。 在对应于简档的流程完成之后,通过一个或多个计算设备继续登录尝试。 响应于登录尝试的成功完成,经由一个或多个计算设备向一个或多个资源授予访问权限。

    Identifying attack patterns in requests received by web applications

    公开(公告)号:US10419451B2

    公开(公告)日:2019-09-17

    申请号:US14936262

    申请日:2015-11-09

    Abstract: A system and a method are disclosed for determining malicious web requests. The system processes incoming web requests to determine whether a request matches predetermined patterns of suspicious requests. The systems stores associations between patterns of suspicious requests, parts of the web request where each pattern occurs, and attack type associated with the pattern. If the system determines that an incoming web request matches a pattern of a suspicious request, the system determines whether to forward the request to the web server for processing or to hold the request. The system locks out a source of request for a period of time if the source sends requests that match certain attack patterns.

    Authentication of client devices using modified images

    公开(公告)号:US10212189B2

    公开(公告)日:2019-02-19

    申请号:US15290367

    申请日:2016-10-11

    Abstract: Systems and methods for detecting phishing attacks and identifying attackers are described. In embodiments, a server system may modify a template image based on user information and provide the modified image to a user system with a login page. The server system may obtain authentication credentials with an image rendered by the user system. The server system may authenticate the user system based on the authentication credentials and information included in the rendered image. Other embodiments may be described and/or claimed.

    CUSTOMIZED USER VALIDATION
    10.
    发明申请

    公开(公告)号:US20180337913A1

    公开(公告)日:2018-11-22

    申请号:US16030706

    申请日:2018-07-09

    Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.

Patent Agency Ranking