×

Techniques for tracking actual users in web application security systems

  • US 8,392,963 B2
  • Filed: 11/27/2006
  • Issued: 03/05/2013
  • Est. Priority Date: 11/28/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method for tracking and identifying an identity of a user using a client to access a web application on a protected server, the method comprising:

  • monitoring, by a secure gateway on a device, client requests for the web application sent from a client to the protected sever, and replies to those client requests sent from the protected server to the client;

    identifying candidate authentication forms in the replies to the client requests sent from the protected server to the client;

    determining which of the candidate authentication forms in those replies are authentication forms;

    generating a normal behavior profile (NBP) for the web application, wherein said NBP includes authentication form identifiers corresponding to those of the candidate authentication forms determined to be the authentication forms;

    monitoring, by the secure gateway using the authentication form identifiers, login requests sent from the client to the protected server, and login responses sent from the protected server to the client in response to the login requests;

    identifying, for each of the authentication form identifiers in the NBP, a combination of login indications and corresponding values in the login responses that indicates a successful login request;

    generating an updated NBP by adding to the NBP, for each of the authentication form identifiers in the NBP, the combination of login indications and corresponding values identified to be indicating a successful login request;

    determining by the secure gateway using the updated NBP whether a subsequent login request submitted by the user was successful;

    saving a first actionable data if the subsequent login request is determined to be successful, wherein the first actionable data comprises user identifiers associated with the user for tracking the user across a plurality of sessions; and

    saving a second actionable data if the subsequent login request is determined to be unsuccessful.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×