×

Systems and methods for detecting and preventing spoofing

  • US 10,212,180 B2
  • Filed: 09/04/2016
  • Issued: 02/19/2019
  • Est. Priority Date: 09/05/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method, performed by at least one computer, for ascertaining legitimacy of communications received by the at least one computer during a digital interaction between the at least one computer and a client device, the method comprising:

  • receiving a communication;

    identifying from the communication a first secured token and a request to access a web page;

    processing the first secured token by;

    obtaining, from the first secured token, information indicating a state of the digital interaction, wherein the information indicating the state of the digital interaction comprises a first value of a counter, the counter indicating a number of times the information indicating the state of the digital interaction has been changed by the at least one computer during the digital interaction; and

    using the information indicating the state of the digital interaction to determine whether the communication is from the client device at least in part by determining whether the first value of the counter matches a value of the counter provided to the client device by the at least one computer prior to receiving the communication;

    when it is determined that the communication is not from the client device, denying access to the requested web page; and

    when it is determined that the communication is from the client device,providing the client device access to the web page;

    updating the information indicating the state of the digital interaction to obtain updated information indicating the state of the digital interaction, the updating comprising increasing the counter from the first value to a second value;

    including the updated information indicating the state of the digital interaction in a second secure token, wherein the updated information indicating the state of the digital interaction comprises the second value of the counter; and

    providing the second secured token to the client device for use in a subsequent communication during the digital interaction.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×