최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0655045 (2017-07-20) |
등록번호 | US-10089679 (2018-10-02) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 0 인용 특허 : 329 |
The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a user computer that is associated with a designated Session ID. A server may include pages that are delivered to a user for viewing in a browser
The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a user computer that is associated with a designated Session ID. A server may include pages that are delivered to a user for viewing in a browser at which time device fingerprints and Session ID information are collected. By collecting device fingerprints and session information at several locations among the pages delivered by the server throughout an online session, and not only one time or at log-in, a comparison between the fingerprints in association with a Session ID can identify the likelihood of session tampering and man-in-the middle attacks.
1. A method for detecting that an online session is compromised, the method comprising: determining a session identifier for an online session between a first device and a second device over a network, wherein the session identifier is associated with a plurality of device fingerprints collected dur
1. A method for detecting that an online session is compromised, the method comprising: determining a session identifier for an online session between a first device and a second device over a network, wherein the session identifier is associated with a plurality of device fingerprints collected during the online session;receiving a first device fingerprint collected during the online session, wherein the first device fingerprint is collected at a first location of a first page;receiving a second device fingerprint collected during the online session, wherein the second device fingerprint is collected at a second location of a second page, where the first page and the second page comprise different content;determining, based at least in part on a comparison between the first device fingerprint and the second device fingerprint, a presence of a third device during the online session which indicates an interference of the online session between the first device and the second device by the third device; andproviding an alert indicating the interference of the online session based at least in part on a determination of the presence of the third device during the online session. 2. The method of claim 1, wherein the interference of the online session comprises at least one of a session tempering or a session hijacking by the third device. 3. The method of claim 1, further comprising: determining a transaction type for the online session; anddetermining a frequency for collecting the plurality of device fingerprints or a number of device fingerprints collected during the online session based at least in part on the transaction type. 4. The method of claim 1, wherein a device fingerprint of the plurality of device fingerprints comprises at least one of: an IP address of the first device, a browser identifier of the first device, a clock skew of the first device, or a time difference between the first device and the second device. 5. The method of claim 1, wherein the first device fingerprint comprises a device identifier associated with the first device and the second device fingerprint comprises another device identifier associated with the third device. 6. The method of claim 1, wherein the first device is associated with a user client while the second device is associated with an online merchant. 7. A computer system for detecting that an online session is compromised, the computer system comprising: a network interface which establishes a connection with a user device over a network;a hardware processor programmed to execute software instructions to cause the computer system to: determine a session identifier for an online session with the user device over the network, wherein the session identifier is associated with a plurality of device fingerprints collected during the online session;receive a first device fingerprint collected during the online session, wherein the first device fingerprint is collected at a first location of a first page;receive a second device fingerprint collected during the online session, wherein the second device fingerprint is collected at a second location of a second page, where the first page and the second page comprise different content;determine, based at least in part on a comparison between the first device fingerprint and the second device fingerprint, a presence of an attacker device during the online session which indicates an interference of the online session by the attacker device; andprovide an alert indicating the interference of the online session based at least in part on a determination of the presence of the attacker device during the online session;a non-transitory data storage configured to: communicate with the hardware processor; andstore information comprising at least one of the following: the session identifier and the plurality of device fingerprints associated with the session identifier. 8. The computer system of claim 7, wherein the interference of the online session comprises at least one of a session tempering or a session hijacking by the attacker device. 9. The computer system of claim 7, wherein the hardware processor is further programmed to: determine a transaction type for the online session; anddetermine a frequency for collecting the plurality of device fingerprints or a number of device fingerprints collected during the online session based at least in part on the transaction type. 10. The computer system of claim 7, wherein a device fingerprint of the plurality of device fingerprints comprises at least one of: an IP address of the user device, a browser identifier of the user device, or a clock skew of the user device. 11. The computer system of claim 7, wherein the first device fingerprint comprises a device identifier associated with the user device and the second device fingerprint comprises another device identifier associated with the attacker device. 12. Non-transitory computer storage having stored thereon a computer program, the computer program including executable instructions that instruct a computer system to at least: determine a session identifier for an online session between a first device and a second device over a network, wherein the session identifier is associated with a plurality of device fingerprints collected during the online session;receive a first device fingerprint collected during the online session, wherein the first device fingerprint is collected at a first location of a first page;receive a second device fingerprint collected during the online session, wherein the second device fingerprint is collected at a second location of a second page, where the first page and the second page comprise different content;determine, based at least in part on a comparison between the first device fingerprint and the second device fingerprint, a presence of a third device during the online session which indicates an interference of the online session between the first device and the second device by the third device; andprovide an alert indicating the interference of the online session based at least in part on a determination of the presence of the third device during the online session. 13. The non-transitory computer storage of claim 12, wherein the interference of the online session comprises at least one of a session tempering or a session hijacking by the third device. 14. The non-transitory computer storage of claim 12, wherein the executable instructions further instruct the computer system to: determine a transaction type for the online session; anddetermine a frequency for collecting the plurality of device fingerprints or a number of device fingerprints collected during the online session based at least in part on the transaction type. 15. The non-transitory computer storage of claim 12, wherein a device fingerprint of the plurality of device fingerprints comprises at least one of: an IP address of the first device, a browser identifier of the first device, a clock skew of the first device, or a time difference between the first device and the second device. 16. The non-transitory computer storage of claim 12, wherein the first device fingerprint comprises a device identifier associated with the first device and the second device fingerprint comprises another device identifier associated with the third device. 17. The non-transitory computer storage of claim 12, wherein the first device is associated with a user client while the second device is associated with an online merchant.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.