SECURITY CODE FOR INTEGRATION WITH AN APPLICATION
First Claim
1. A computer system comprising:
- one or more hardware processors;
at least one memory coupled to the one or more hardware processors and storing one or more instructions which, when executed by the one or more hardware processors, cause the one or more hardware processors to;
receive a first request associated with a request to an application server by an application executing on a client device that includes security code that, when executed, performs a set of one or more operations on one or more input parameters to generate a secret output;
provide the application one or more parameter values, wherein the security code generates a secret cryptographic key by performing the set of one or more operations on the one or more parameter values;
receive a security key in association with a second request by the application to the application server, the security key comprising encrypted client data collected at the client device that is encrypted using the secret cryptographic key;
generate the secret cryptographic key based on the one or more parameter values and knowledge of the set of one or more operations;
generate decrypted client data by decrypting the security key with the secret cryptographic key;
determine that the decrypted client data matches a pattern of data associated with malware;
in response to determining that the decrypted client data matches the pattern of data, prevent the application server from processing the second request.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are provided for security code for integration with an application. A first request associated with a request by an application to an application server is received. The application includes security code that performs a set of one or more operations on one or more input parameters. The application is provided one or more parameter values, wherein the security code generates a secret cryptographic key based on the one or more parameter values. A security key is received that includes encrypted client data collected at the client device that is encrypted using the secret cryptographic key. The secret cryptographic key is generated based on the one or more parameter values and knowledge of the set of one or more operations. It is determined that the decrypted client data matches a pattern of data associated with malware. The application server is prevented from processing a second request.
0 Citations
20 Claims
-
1. A computer system comprising:
-
one or more hardware processors; at least one memory coupled to the one or more hardware processors and storing one or more instructions which, when executed by the one or more hardware processors, cause the one or more hardware processors to; receive a first request associated with a request to an application server by an application executing on a client device that includes security code that, when executed, performs a set of one or more operations on one or more input parameters to generate a secret output; provide the application one or more parameter values, wherein the security code generates a secret cryptographic key by performing the set of one or more operations on the one or more parameter values; receive a security key in association with a second request by the application to the application server, the security key comprising encrypted client data collected at the client device that is encrypted using the secret cryptographic key; generate the secret cryptographic key based on the one or more parameter values and knowledge of the set of one or more operations; generate decrypted client data by decrypting the security key with the secret cryptographic key; determine that the decrypted client data matches a pattern of data associated with malware; in response to determining that the decrypted client data matches the pattern of data, prevent the application server from processing the second request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving a first request associated with a request to an application server by an application executing on a client device that includes security code that, when executed, performs a set of one or more operations on one or more input parameters to generate a secret output; providing the application one or more parameter values, wherein the security code generates a secret cryptographic key by performing the set of one or more operations on the one or more parameter values; receiving a security key in association with a second request by the application to the application server, the security key comprising encrypted client data collected at the client device that is encrypted using the secret cryptographic key; generating the secret cryptographic key based on the one or more parameter values and knowledge of the set of one or more operations; generating decrypted client data by decrypting the security key with the secret cryptographic key; determining that the decrypted client data matches a pattern of data associated with malware; in response to determining that the decrypted client data matches the pattern of data, preventing the application server from processing the second request; wherein the method is performed by one or more processors. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification