-
公开(公告)号:US20210258330A1
公开(公告)日:2021-08-19
申请号:US17232999
申请日:2021-04-16
Applicant: Shape Security, Inc.
Inventor: Daniel G. Moen , Carl Schroeder
Abstract: Techniques are provided for detecting compromised credentials in a credential stuffing attack. A set model is trained based on a first set of spilled credentials. The set model does not comprise any credential of the first set of spilled credentials. A first request is received from a client computer with a first candidate credential to login to a server computer. The first candidate credential is tested for membership in the first set of spilled credentials using the set model. In response to determining the first set of spilled credentials includes the first candidate credential using the set model, one or more negative actions is performed.
-
公开(公告)号:US20190140835A1
公开(公告)日:2019-05-09
申请号:US16236566
申请日:2018-12-30
Applicant: Shape Security, Inc.
Inventor: Daniel G. Moen , Bryan D. Hanks
Abstract: Techniques are provided for blind hash compression, such as serving, from a computer server system and to a plurality of different computing devices remote from the computer server system, web code and code for reporting status of the computing devices; receiving from one or more of the computing devices, first data that indicates a parameter of the one or more computing devices, the first data in a compressed format; receiving from one or more others of the computing devices, second data that indicates the parameter of the one or more others of the computing devices, the second data in an uncompressed format; and compressing the second data and comparing the compressed second data to the first data to correlate the first data to the second data. The code for reporting status of the computing devices can include code for allowing the computing devices to determine whether to send the first or second data.
-
公开(公告)号:US12126631B2
公开(公告)日:2024-10-22
申请号:US17232999
申请日:2021-04-16
Applicant: Shape Security, Inc.
Inventor: Daniel G. Moen , Carl Schroeder
CPC classification number: H04L63/1416 , H04L63/1425 , H04L67/01 , H04L67/02 , G06N20/00 , H04L63/083
Abstract: Techniques are provided for detecting compromised credentials in a credential stuffing attack. A set model is trained based on a first set of spilled credentials. The set model does not comprise any credential of the first set of spilled credentials. A first request is received from a client computer with a first candidate credential to login to a server computer. The first candidate credential is tested for membership in the first set of spilled credentials using the set model. In response to determining the first set of spilled credentials includes the first candidate credential using the set model, one or more negative actions is performed.
-
公开(公告)号:US10911438B2
公开(公告)日:2021-02-02
申请号:US16025918
申请日:2018-07-02
Applicant: Shape Security, Inc.
Inventor: Zhipu Jin , Gautam Agrawal , Daniel G. Moen , Weiguo Liang , Xingang Wang
IPC: H04L29/06 , H04L9/06 , G06F16/951 , H04L9/08 , H04L9/32
Abstract: Techniques are provided for secure detection and management of compromised credentials. A first candidate credential is received, comprising a first username and a first password, wherein the first candidate credential was sent in a first request from a first client computer to log in to a first server computer. A first salt associated with the first username in a salt database is obtained. A first hashed credential is generated based on the first password and the first salt. The first hashed credential is transmitted to a set model server computer, wherein the set model server computer is configured to maintain a set model that represents a set of spilled credentials, determine whether the first hashed credential is represented in the set model, and in response to determining that the first hashed credential is represented in the set model, performing additional processing on the first hashed credential.
-
公开(公告)号:US10212137B1
公开(公告)日:2019-02-19
申请号:US14980231
申请日:2015-12-28
Applicant: Shape Security, Inc.
Inventor: Daniel G. Moen , Bryan D. Hanks
Abstract: A computer-implemented method includes serving, from a computer server system and to a plurality of different computing devices remote from the computer server system, web code and code for reporting status of the computing devices; receiving from one or more of the computing devices, first data that indicates a parameter of the one or more computing devices, the first data in a compressed format; receiving from one or more others of the computing devices, second data that indicates the parameter of the one or more others of the computing devices, the second data in an uncompressed format; and compressing the second data and comparing the compressed second data to the first data to correlate the first data to the second data. The code for reporting status of the computing devices can include code for allowing the computing devices to determine whether to send the first or second data.
-
公开(公告)号:US20190007387A1
公开(公告)日:2019-01-03
申请号:US16025918
申请日:2018-07-02
Applicant: Shape Security, Inc.
Inventor: Zhipu Jin , Gautam Agrawal , Daniel G. Moen , Weiguo Liang , Xingang Wang
Abstract: Techniques are provided for secure detection and management of compromised credentials. A first candidate credential is received, comprising a first username and a first password, wherein the first candidate credential was sent in a first request from a first client computer to log in to a first server computer. A first salt associated with the first username in a salt database is obtained. A first hashed credential is generated based on the first password and the first salt. The first hashed credential is transmitted to a set model server computer, wherein the set model server computer is configured to maintain a set model that represents a set of spilled credentials, determine whether the first hashed credential is represented in the set model, and in response to determining that the first hashed credential is represented in the set model, performing additional processing on the first hashed credential.
-
-
-
-
-