Patent classifications
G06F21/128
Authentication translation
Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.
SYSTEM TO DETECT AUTOMATED WEB SUBMISSIONS
A system to identify automated submissions of web pages, such as those submitted by bots, in real time. The system comprising a processor configured to update an initial version of a requested web page with at least one hidden field, transmit the updated web page to the client, then, upon receipt parse the completed web page, and identify if a data entry is associated with the at least one hidden field. Where a data entry is associated with the at least one hidden field, the system blocks the transmission of the completed web page to the server. Where a data entry is not associated with the at least one hidden field the system removes the at least one hidden field, and transmits the final web page to the server.
Decentralized document and entity verification engine
A system and method enabling an entity to prove its identity and provide authentic documents/data/information therein at any time required based upon data retrieved from an independent cryptographically verifiable source (ICVS) through a secured channel is disclosed. The system enables a virtual and secure browser on a user computing device allowing a user to login and retrieve authentic information pertaining to the user from the ICVS in a verifiable and untamperable manner. The retrieved information is bounded with origination information of the ICVS and the bounded information is provided to relying entities as authentic information for verification. Also, cryptographic value of the authentic information can be stored in an immutable storage such as blockchain, so that the cryptographic value is used by the relying-party to validate integrity of the authentic information.
Hash-based dynamic restriction of content on information resources
Systems and methods for restricting content inserted into information resources are provided herein. A computing device can identify a content element included in an information resource. The computing device can identify a bit stream corresponding to the content element included in the information resource. The computing device can hash the identified bit stream to generate an element identifier corresponding to the content element. The computing device can access a restricted content database using the element identifier. The computing device can modify, responsive to finding the element identifier in the restricted content database, the presentation of the content element on the information resource in accordance with the content restriction policy.
System and method for securing a browser against font usage fingerprinting
In a method for securing a web browser, display instructions for displaying web content are received from a content server by a web browser operating on a client computing device. The web browser creates a document object using the display instructions and determines from the document object whether one or more of the display instructions meet font profiling criteria selected to identify attempts to profile font display characteristics of the web browser. Responsive to a determination that font profiling criteria are met, the web browser alters a character display of the document object and implements the document object for displaying the web content on the client computing device.
Authentication translation
Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.
Protecting data
Protecting data is disclosed, including: analyzing, using one or more processors, a set of scripting resource source data to determine a plurality of semantic units; determining a tree-structured source data based at least in part on mapping values of the plurality of semantic units to respective ones of a plurality of semantic structures; selecting an obfuscation strategy to apply to the tree-structured source data, wherein the selected obfuscation strategy includes one or more obfuscation techniques; determining an obfuscated tree-structured source data based at least in part by applying the selected obfuscation strategy to the tree-structured source data; and converting the obfuscated tree-structured source data into a set of obfuscated scripting resource source data.
Securing webpages, webapps and applications
A method for securing a webpage or a webapp processed by a browser executing on a client system, the method comprising the browser executing an instance of white-box protected code, wherein execution of the instance of white-box protected code causes the client system to: generate a message comprising message data for use by a control system to perform one or more security tests, the control system communicably connected to the client system via a network; send the message to the control system to enable the control system to perform the one or more security tests using the message data; receive a response from the control system based, at least in part, on the message; and process the response.
Systems and methods for exploit prevention and malicious code neutralization using non-predictable results for JavaScript-enabled applications
Systems, methods, and computer-readable media for cybersecurity are disclosed. The systems and methods may involve receiving, by an application capable of JavaScript execution, code for execution; executing, before execution of the received code, an intercepting code, wherein the intercepting code is configured to intercept at least one application programming interface (API) invocation by the received code; intercepting, by the intercepting code, an API invocation by the received code; determining that the intercepted API invocation results in a manipulation of a backing store object; and modifying an execution of the intercepted API invocation, wherein the modified execution results in at least one of: a non-predictable memory layout, a non-predictable memory behavior, or a non-predictable property of an object.
Protecting against the introduction of alien content
In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client.