-
公开(公告)号:US10169460B2
公开(公告)日:2019-01-01
申请号:US14985848
申请日:2015-12-31
Applicant: Oath Inc.
Inventor: William Salusky , Mark Ellzey Thomas
Abstract: Processes are disclosed for fingerprinting and identifying client applications based on the analysis of client requests. In an HTTP-based embodiment, a fingerprint is constructed based on the presence and order of HTTP headers included in a request from a client application or device. This fingerprint may then be compared to known fingerprints associated with particular client applications to identify the particular client application and/or to assess whether the client application is malicious. The results of this analysis may, for example, be used to determine how to respond to the current request and/or subsequent requests.
-
公开(公告)号:US20190087495A1
公开(公告)日:2019-03-21
申请号:US16197516
申请日:2018-11-21
Applicant: Oath Inc.
Inventor: William Salusky , Mark Ellzey Thomas
Abstract: Processes are disclosed for fingerprinting and identifying client applications based on the analysis of client requests. In an HTTP-based embodiment, a fingerprint is constructed based on the presence and order of HTTP headers included in a request from a client application or device. This fingerprint may then be compared to known fingerprints associated with particular client applications to identify the particular client application and/or to assess whether the client application is malicious. The results of this analysis may, for example, be used to determine how to respond to the current request and/or subsequent requests.
-
公开(公告)号:US10885128B2
公开(公告)日:2021-01-05
申请号:US16197516
申请日:2018-11-21
Applicant: Oath Inc.
Inventor: William Salusky , Mark Ellzey Thomas
IPC: G06F15/16 , G06F16/951 , G06F16/95 , G06F16/2457 , H04L29/06
Abstract: Processes are disclosed for fingerprinting and identifying client applications based on the analysis of client requests. In an HTTP-based embodiment, a fingerprint is constructed based on the presence and order of HTTP headers included in a request from a client application or device. This fingerprint may then be compared to known fingerprints associated with particular client applications to identify the particular client application and/or to assess whether the client application is malicious. The results of this analysis may, for example, be used to determine how to respond to the current request and/or subsequent requests.
-
-