×

Cross-site request forgery defense

  • US 9,774,622 B2
  • Filed: 04/24/2017
  • Issued: 09/26/2017
  • Est. Priority Date: 08/07/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for defending against a cross-site request forgery (CSRF) attack, the method comprising:

  • serving a content item to a client computing device, wherein the content item includes an embedded executable script;

    receiving a first asynchronous request for a first CSRF token from the client computing device, wherein the first asynchronous request is generated as a result of running the embedded executable script at the client computing device;

    generating the first CSRF token in response to the first asynchronous request, wherein the first CSRF token is generated using a hash message authentication code (HMAC) key;

    sending the first CSRF token to the client computing device;

    receiving a second asynchronous request for a second CSRF token from the embedded executable script of the client computing device, wherein the second asynchronous request is received after sending the first CSRF token to the client computing device;

    generating the second CSRF token in response to the second asynchronous request, wherein the second CSRF token is also generated using the HMAC key;

    sending the second CSRF token to the client computing device;

    receiving, from the client computing device, a request to access a resource provided by a server computing device, wherein the request includes a received CSRF token; and

    determining whether the received CSRF token can be authenticated using the HMAC key.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×