×

Systems and methods for detecting and preventing spoofing

  • US 10,129,279 B2
  • Filed: 09/04/2016
  • Issued: 11/13/2018
  • Est. Priority Date: 09/05/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method, performed by at least one computer, the method comprising:

  • receiving a communication from an application program executing on a client device different from the at least one computer;

    identifying from the communication an asserted identity of the application program;

    determining whether the application program has the asserted identity at least in part by;

    interacting with the client device to obtain additional information about at least one capability of the application program, the interacting comprising;

    transmitting, via at least one network to the client device, a software program that, when executed by the client device, collects the additional information about the at least one capability of the application program at least in part by programmatically testing the application program to determine whether the application program is able to recognize an object; and

    receiving, from the client device, the additional information about the at least one capability of the application program; and

    determining whether the additional information about the at least one capability of the application program indicates that the application program is able to recognize the object, the determining comprising;

    comparing the additional information about the at least one capability of the application program to information about one or more application programs having the asserted identity;

    determining whether the application program has the asserted identity based at least in part on whether the application program is able to recognize the object;

    granting the client device access to a resource responsive to determining that the application program has the asserted identity; and

    denying the client device access to the resource responsive to determining that the application program does not have the asserted identity.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×