Browser extensionless phish-proof multi-factor authentication (MFA)

    公开(公告)号:US20240275778A1

    公开(公告)日:2024-08-15

    申请号:US18636468

    申请日:2024-04-16

    发明人: Charles E. Gero

    IPC分类号: H04L9/40

    CPC分类号: H04L63/083

    摘要: A multi-factor authentication scheme uses an MFA authentication service and a browser extensionless phish-proof method to facilitate an MFA workflow. Phish-proof MFA verifies that the browser the user is in front of is actually visiting the authentic (real) site and not a phished site. This achieved by only allowing MFA to be initiated from a user trusted browser by verifying its authenticity through a signing operation using a key only it possesses, and then also verifying that the verified browser is visiting the authentic site. In a preferred embodiment, this latter check is carried out using an iframe postMessage owning domain check. In a variant embodiment, the browser is verified to be visiting the authentic site through an origin header check. By using the iframe-based or ORIGIN header-based check, the solution does not require a physical security key (such as a USB authenticator) or any browser extension or plug-in.

    Using the state of a request routing mechanism to inform attack detection and mitigation

    公开(公告)号:US12063245B2

    公开(公告)日:2024-08-13

    申请号:US16409517

    申请日:2019-05-10

    IPC分类号: H04L9/40 H04L67/10

    摘要: Among other things, this document describes systems, methods and apparatus for identifying and mitigating network attacks, particularly botnet attacks and other volumetric attacks. In some embodiments, a distributed computing platform provides client-facing service endpoints and a request routing mechanism (request router or RR) directing clients to a particular service endpoint or cluster thereof to obtain a service. The state of the RR at a given time is communicated to enforcement points in the system, which may be cluster equipment, service endpoints, or other components. When client traffic arrives at a particular enforcement point it is checked for consistency with the RR's directions, referred to as ‘mapping consistency’. This information is incorporated into decisions about how to handle the packets from the client.

    Fast, secure, and scalable data store at the edge for connecting network enabled devices

    公开(公告)号:US11997096B2

    公开(公告)日:2024-05-28

    申请号:US17323141

    申请日:2021-05-18

    摘要: A distributed computing system provides a distributed data store for network enabled devices at the edge. The distributed database is partitioned such that each node in the system has its own partition and some number of followers that replicate the data in the partition. The data in the partition is typically used in providing services to network enabled devices from the edge. The set of data for a particular network enabled device is owned by the node to which the network enabled device connects. Ownership of the data (and the data itself) may move around the distributed computing system to different nodes, e.g., for load balancing, fault-resilience, and/or due to device movement. Security/health checks are enforced at the edge as part of a process of transferring data ownership, thereby providing a mechanism to mitigate compromised or malfunctioning network enabled devices.

    Client Entity Validation with Session Tokens Derived From Underlying Communication Service Values

    公开(公告)号:US20240121269A1

    公开(公告)日:2024-04-11

    申请号:US17938386

    申请日:2022-10-06

    发明人: Eric Elbaz

    IPC分类号: H04L9/40

    摘要: The generation and use of session tokens in a computer networking environment is disclosed. Such session tokens can be used in a variety of ways, such as to validate client identity and entitlement to resources, for security assessment, or in other trust establishment mechanisms. Preferably, the session token generation algorithm incorporates one or more non-ephemeral value(s) that are established for a given communication session between two hosts. To validate a token presented by a client, for example, a server can check it against the session values actually in use to communicate with the client.

    Content delivery network (CDN)-based bot detection service with stop and reset protocols

    公开(公告)号:US11848960B2

    公开(公告)日:2023-12-19

    申请号:US17667023

    申请日:2022-02-08

    IPC分类号: H04L29/06 H04L9/40

    摘要: A server interacts with a bot detection service to provide bot detection as a requesting client interacts with the server. In an asynchronous mode, the server injects into a page a data collection script configured to record interactions at the requesting client, to collect sensor data about the interactions, and to send the collected sensor data to the server. After the client receives the page, the sensor data is collected and forwarded to the server through a series of posts. The server forwards the posts to the detection service. During this data collection, the server also may receive a request from the client for a protected endpoint. When this occurs, and in a synchronous mode, the server issues a query to the detection service to obtain a threat score based in part on the collected sensor data that has been received and forwarded by the server. Based on the threat score returned, the server then determines whether the request for the endpoint should be forwarded onward for handling.

    Efficient congestion control in a tunneled network

    公开(公告)号:US11805061B2

    公开(公告)日:2023-10-31

    申请号:US17233742

    申请日:2021-04-19

    摘要: A method of congestion control implemented by a sender over a network link that includes a router having a queue. During a first state, information is received from a receiver. The information comprises an estimated maximum bandwidth for the link, a one-way transit time for traffic over the link, and an indication whether the network link is congested. In response to the link being congested, the sender transitions to a second state. While in the second state, a sending rate of packets in reduced, in part to attempt to drain the queue of data packets contributed by the sender. The sender transitions to a third state when the sender estimates that the queue has been drained of the data packets contributed. During the third state, the sending rate is increased until either the sender transitions back to the first state, or receives a new indication that the link is congested.