System and method of using spatial and temporal signals to identify and prevent attacks
First Claim
1. A method of determining the validity of a request for information over a network, the method comprising:
- receiving a first request from a node of the network, the request associated with first location information and a first time attribute;
receiving a second request from the node of the network, the request associated with second location information and a second time attribute;
determining a first location of a device from the first location information;
determining a second location of the device from the second location information;
determining a time difference between the first time attribute and the second time attribute;
determining a geographic distance between the first location and the second location;
selecting, from a plurality of statistical records of requests each associated with a time difference and a threshold distance, a statistical record of requests based on the time difference;
generating a list of valid combinations identifying valid combinations of device information and transmission information; and
identifying the second request as a valid request if the geographic distance is less than the threshold distance associated with the selected statistical record;
wherein the identifying of the second request as a valid request further includes identifying a geographic location, device information and device transmission information identified in the list of valid combinations.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods according to aspects of the invention verify requests for information over a network. Computing devices communicating over a network transmit numerous signals with various types of information including spatial information, temporal information, device-specific information, and transmission specific information. This information may be used to generate statistical records of valid request for information. Various combinations of these signals may be used to determine whether a request for information is a valid request based on the statistical records associated with the signals. Where a request for information has been verified, the system and method may provide the information. Where the request for information has not been verified, the system and method may deny the request for information. Thus the system and method may be used to prevent and block scraping and spamming attacks.
-
Citations
6 Claims
-
1. A method of determining the validity of a request for information over a network, the method comprising:
-
receiving a first request from a node of the network, the request associated with first location information and a first time attribute; receiving a second request from the node of the network, the request associated with second location information and a second time attribute; determining a first location of a device from the first location information; determining a second location of the device from the second location information; determining a time difference between the first time attribute and the second time attribute; determining a geographic distance between the first location and the second location; selecting, from a plurality of statistical records of requests each associated with a time difference and a threshold distance, a statistical record of requests based on the time difference; generating a list of valid combinations identifying valid combinations of device information and transmission information; and identifying the second request as a valid request if the geographic distance is less than the threshold distance associated with the selected statistical record; wherein the identifying of the second request as a valid request further includes identifying a geographic location, device information and device transmission information identified in the list of valid combinations. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification