User authentication using client-side browse history
First Claim
1. A computer-implemented method, comprising:
- receiving, by a computer system, a request for a login web page of a web site, the request received from a computing device associated with a user account, the login web page configured to facilitate an authentication of the user account based at least in part on a username and a password;
inserting, by the computer system in the login web page, a universal resource locator (URL) of a second web page of the web site and code, the code configured to, upon execution at the computing device;
determine whether the URL and a cascading style sheets (CSS) attribute of the URL are present in a browser history stored at the computing device, anddetermine, based at least in part on presence of the URL and the CSS attribute in the browser history, that the second web page was accessed by the computing device prior to receiving the request for the login web page, the second web page accessed by the computing device prior to receiving the request based at least in part on a prior authentication of the user account via the login web page;
providing, by the computer system to the computing device and based at least in part on the request, the login web page comprising the URL of the second web page and the code;
receiving, by the computer system from the computing device, an indication that the second web page was accessed prior to receiving the request for the login web page, the indication received based at least in part on a determination by the code of the presence of the URL and the CSS attribute in the browser history upon an execution of the code at the computing device; and
authenticating, by the computer system, the user account based at least in part on the indication.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for authenticating a user may be described. In particular, a network-based document may be provided to a computing system of a user. The network-based document may include code and an identifier of another network-based document. The code may be configured to, upon execution, determine whether the other network-based document was accessed prior to providing the network-based document to the computing system. The other network-based document may be accessible to the user based on an identifier of the user. An indication that the other network-based document was accessed may be determined. For example, the indication may be received from the computing system based on an execution of the code at the computing system. The user may be authenticated based on the indication.
53 Citations
18 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a computer system, a request for a login web page of a web site, the request received from a computing device associated with a user account, the login web page configured to facilitate an authentication of the user account based at least in part on a username and a password; inserting, by the computer system in the login web page, a universal resource locator (URL) of a second web page of the web site and code, the code configured to, upon execution at the computing device; determine whether the URL and a cascading style sheets (CSS) attribute of the URL are present in a browser history stored at the computing device, and determine, based at least in part on presence of the URL and the CSS attribute in the browser history, that the second web page was accessed by the computing device prior to receiving the request for the login web page, the second web page accessed by the computing device prior to receiving the request based at least in part on a prior authentication of the user account via the login web page; providing, by the computer system to the computing device and based at least in part on the request, the login web page comprising the URL of the second web page and the code; receiving, by the computer system from the computing device, an indication that the second web page was accessed prior to receiving the request for the login web page, the indication received based at least in part on a determination by the code of the presence of the URL and the CSS attribute in the browser history upon an execution of the code at the computing device; and authenticating, by the computer system, the user account based at least in part on the indication. - View Dependent Claims (2)
-
-
3. One or more non-transitory computer-readable media comprising instructions that, when executed with one or more processors, cause a system to at least:
-
provide, to a computing system associated with a user account, a first network-based document of a network-based resource, the first network-based document comprising code and an identifier of a second network-based document of the network-based resource, the identifier comprising a network address of the second network-based document, the code configured at least to, upon execution; determine whether the network address and a cascading style sheets (CSS) attribute of the network address are present in a history stored at the computing system, and determine, based at least in part on presence of the network address and the CSS attribute in the history, that the second network-based document was accessed prior to providing the first network-based document to the computing system, the second network-based document accessed based at least in part on an identifier of the user account; determine an indication that the second network-based document was accessed, the indication determined based at least in part on a determination of the presence of the network address and the CSS attribute in the history upon an execution of the code at the computing system; and authenticate the user account based at least in part on the indication. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
one or more processors; one or more non-transitory computer-readable media comprising instructions that, when executed with the one or more processors, cause the system to at least; add, to a first network-based document from a network-based resource of a provider, an identifier of a second network-based document from the network-based resource and code based at least in part on a request for the first network-based document, the identifier comprising a network address of the second network-based document, the request received from a computing system of a user, the code configured at least to, upon execution; determine whether the network address and a cascading style sheets (CSS) attribute of the network address are present in a history stored at the computing system, and determine, based at least in part on presence of the network address and the CSS attribute in the history, that the second network-based document was accessed, the second network-based document accessed based at least in part on an identifier of the user; provide the first network-based document to the computing system based at least in part on the request; receive, from the computing system, an indication that the second network-based document was accessed prior to providing the first network-based document to the computing system, the indication received based at least in part on a determination of the presence of the network address and the CSS attribute in the history upon an execution of the code at the computing system; and authenticate the user based at least in part on the indication. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification